I decompiled the White House's new app
Overall reaction to the app analysis
- Many see the app as a “standard marketing/consultancy React Native app” with common tracking SDKs and rough edges, not uniquely bad for the industry.
- Others argue that for an official White House app, expectations should be much higher; several call it “amateur hour.”
- Some commenters say they actually expected worse given the administration.
Location tracking and permissions (conflicting claims)
- The article’s description of a full GPS tracking pipeline via OneSignal is seen as technically plausible but:
- Several point out that without location permissions in the Android manifest, Android will block location access regardless of code.
- Others initially thought the manifest lacked those permissions but later found conflicting evidence between Play Store web vs device views and different app versions.
- One view: the pipeline is “compiled in but dead” due to missing permissions; another: earlier versions may have had them, or the article may mix versions.
- Multiple people stress that OneSignal and similar SDKs often bundle location features by default, even if unused.
Third‑party JavaScript, hotlinking, and supply chain risk
- Strong criticism that the app loads JS from a personal GitHub Pages site and other third‑party CDNs inside WebViews, giving whoever controls those repos arbitrary code execution.
- Some say this would “never happen in a professional app”; others counter that hotlinking to CDNs and unpinned dependencies is common practice on the web, citing Bootstrap/HTMX/FontAwesome patterns.
- Broad agreement that vendoring or pinning dependencies would be safer, especially for a government app.
Cookie / paywall bypass injection
- Many users like that the injected CSS/JS removes cookie banners, GDPR dialogs, and soft paywalls, comparing it to uBlock annoyance filters or reader mode.
- Others argue it’s legally and ethically dubious, especially when it strips consent flows on EU sites and further undermines privacy norms.
TLS, certificate pinning, and MITM
- Some criticize lack of certificate pinning; others say it’s not standard practice and can hinder independent analysis.
- Long subthread debates CA trust, certificate transparency logs, and corporate/MITM boxes; consensus is that HTTPS is imperfect but “good enough,” and pinning is situational, not mandatory.
Quality of the article and use of AI
- A few suspect the writeup was partly AI‑generated (stylistic cues, large tables) and question its accuracy, especially around permissions.
- Others push back, arguing that dismissing work “because AI” is unhelpful; they focus instead on specific technical disagreements.
UX and meta observations
- Multiple readers complain the article’s site scrolls poorly and is GPU‑heavy, which they note is ironic given its criticism of web development.
- Some lament the hollowing out of federal digital talent and contractors winning large sums for mediocre output.