We intercepted the White House app's network traffic

(atomic.computer)

231 points | by donutpepperoni a day ago ago

58 comments

  • john_strinlai a day ago ago

    43% (of the 158 3rd-party requests) is... google. youtube, fonts, and analytics. 55% if you include facebook and twitter.

    a government app shouldnt have crazy analytics and tracking and whatever. but i dont think loading google fonts or embedding youtube videos is really all that wild in the grand scheme of things.

    given the title, i was half expecting some sort of egregious list with, like, palantir and some ICE domains or something. i dont like the app, but google? facebook? that is pretty boring.

    the title probably should focus on nature/severity of the requests. titling it with a % of all requests feels bait-y if google/facebook/twitter isnt off in its own category. they have all sorts of dumb little requests to all sorts of domains that really inflate the numbers.

    (as a note, atomic.computer also loads analytics and google fonts. which is whatever. but if they are going to imply 3rd-party requests are inherently bad just by nature of being 3rd-party, they may want to clean their own house a little bit.)

    edit: original title at the time of my comment was "We intercepted the White House app's traffic. 77% of requests go to 3rd parties"

    • fmbb 21 hours ago ago

      > given the title, i was half expecting some sort of egregious list with, like, palantir and some ICE domains or something. i dont like the app, but google? facebook? that is pretty boring.

      Are ICE and Palantir forbidden from buying data from Google or Facebook?

      This sounds like a smart way to own an app where you decide what you want to track and nobody is stopping you from getting the data you are phoning home. And you can launder it through normal tracking providers.

      • blululu 10 hours ago ago

        No but Google and Facebook generally do not sell data. They collect data and sell advertising spots based on this data. The data exfiltration to Google/Facebooks comes stock with a lot of mobile tooling. You can object to this arrangement but it is pretty common and often the easiest development path. As the parent points out the author of the post is engaged in the same practice so it is not exactly malicious or unusual.

    • nickvec 20 hours ago ago

      If you read through the article, you'll see that the author focuses more on the OneSignal and Elfsight requests. The generic third party requests to Google, YouTube, etc. presumably were included for completeness + transparency and aren't meant to be some damning evidence against the White House app.

      Though if your comment is solely based off of the previous title alone, then fair enough.

    • bulbar a day ago ago

      > given the title, i was half expecting some sort of egregious list with, like, palantir and some ICE domains or something. i dont like the app, but google? facebook? that is pretty boring.

      Current government tries to steer the ship that is the US in the direction of an autocratic state as can be seen by most of their actions. But it's a huge ship and it takes time, no matter how hard you try (luckily).

    • 1vuio0pswjnm7 7 hours ago ago

      "(as a note, atomic.computer also loads analytics and google fonts. which is whatever. but if they are going to imply 3rd-party requests are inherently bad just by nature of being 3rd-party, they may want to clean their own house a little bit.)"

      Opinions may differ on this but mine is that this form of argument^1 is extremely weak and only strengthens the counter position, i.e., that third party requests are _in practice_ worth reporting on. As with any reported information, the readers of the reporting may draw their own conclusions and make value judgments about what is "good" or "bad"

      1. The form of argument goes something like "X website is reporting on Y phenomenon, e.g., data collection, tracking, etc., using Z website as an example, but because X is also an example, X cannot or should not report on Y." The later is arguably "shooting the messenger"

      https://en.wikipedia.org/wiki/Shooting_the_messenger

      AFAICT this atomic.computer web page does not suggest third party requests are "inherently bad". That is a conclusion presented by the HN commenter. What the atomic.computer web page does is examine the use of third party requests as a means of data collection and tracking. The HN commenter then cites an imaginary opinion about third party requests being "inherently bad". For me, this suggests there may be something behind that idea. Perhaps the commenter has "insider" knowledge of some sort regarding data collection and tracking. It's like a leak from a guilty conscience

      Generally, there is no way for a computer user to monitor and control how data is used once it is collected nor where it may or may not be transferred

      As such, this is not question of "bad" versus "good" in any universal sense. That may be something that weighs on the minds of people connected to data collection and/or tracking practices. But every user is different. The issue for the user is control. The user cannot limit how the data is used or where it could be transferred, even he had some opinion about what uses were "good" and what uses if any were "bad"

      What companies do with data collected from "apps" is within their control, not the user's. Generally the operators of "app" endpoints have no obligation to disclose (a) how the data collected is used, whether it is used to "improve the service", improve their own sales/revenue, improve someone else's sales, etc. or (b) where the data might be transferred, whether that transfer is voluntary or involuntary, e.g., data breach, mergers and acquisitions, bankruptcy, requests from law enforcement, etc.

      • john_strinlai 5 hours ago ago

        did you really need to link me to a wikipedia page of "shooting the messenger"? are you aware of how condescending that appears?

        >Perhaps the commenter has "insider" knowledge of some sort regarding data collection and tracking. It's like a leak from a guilty conscience

        >That may be something that weighs on the minds of people connected to data collection and/or tracking practices

        what are you even trying to say here? you seem to be trying really hard to call me something without actually calling me something.

        anyways, my comment was not trying to convince you of anything or win any argument. believe what you want. i believe that this was a boring article, and the original title was clickbait. that is about it.

        p.s. you might be the first person i have ever met that is unaware of the implicit negative connotation associated with "3rd-party requests". especially given the full context and the previous post by the blog author, i suspect you are being willfully ignorant here.

    • wavefunction a day ago ago

      People will excuse anything when it suits them

      • john_strinlai a day ago ago

        >People will excuse anything when it suits them

        i am not sure what you are intending to imply. what suits me and how?

        i called it boring. flip on a news channel, click any other link on the front page here, or look outside and you will find something more interesting than "app sends a lot of requests to google".

        that doesnt mean i think it is good or that i am making an excuse. it means that it is boring. this site is supposed to "optimize for curiosity" or however dang phrases it.

  • merek a day ago ago

    > We installed mitmproxy on a Mac, configured an iPhone to route traffic through it, and installed the mitmproxy CA certificate on the device.

    > All HTTPS traffic was decrypted and logged. No modifications were made to the traffic. The app was used as any normal user would use it.

    Is it really that simple to inspect network traffic on an iPhone, namely to get it to trust the user-installed cert? I do quite a bit of network inspection on Android and I find it to be painful, even if the apps don't use certificate pinning.

    Regardless, it highlights the importance of having control of our own devices, including the ability to easily inspect network traffic. We have the right to know where our data is being sent, and what data is being sent.

    I recall during COVID it was discovered that Zoom was sending traffic to China. There was also the recent case of Facebook tracking private mobile browsing activity and sending it to their servers via the FB app. Imagine how much questionable traffic goes unnoticed due to the difficulty in configuring network inspection for apps.

    • jeroenhd 21 hours ago ago

      > Is it really that simple to inspect network traffic on an iPhone, namely to get it to trust the user-installed cert?

      iOS still trusts user-installed certs by default, unlike Android's opt-in model.

      However, this only applies to apps using the OS TLS stack. Apps packaging their open openssl may use their own set of certificate authorities. Also, most big apps use certificate pinning for most of their domains.

      Apps from Twitter or Facebook probably won't work due to pinning. Quick and dirty could-have-been-a-single-web-page apps, such as this one, usually won't bother with any of that, and neither do many tracking libraries.

      Of course, malicious apps can detect when someone is using an altered certificate and choose not to send traffic until the MitM is over.

    • varun_ch a day ago ago

      Yes, it is _a lot_ easier to set up mitmproxy on iOS vs Android. But once you encounter an app with certificate pinning, being on a more open platform that lets you install your own apps can help get around that.

    • cedws a day ago ago

      Installing the CA requires jumping through some hoops, but yes, intercepting traffic for apps that don’t use cert pinning isn’t that difficult on iOS.

      Apps that do use cert pinning is a whole other matter, I’ve tried unsuccessfully a few times to inspect things like banking apps. Needs a rooted device at the minimum.

      • funman7 a day ago ago

        So I assume the white house app doesn’t do cert pinning

        Also looked into this a long time ago… could someone tell me how to do this with cert pinned apps ?

        • selcuka 19 hours ago ago

          In general you can't without patching the app itself, statically or at runtime using something like Frida.

    • userbinator a day ago ago

      Regardless, it highlights the importance of having control of our own devices, including the ability to easily inspect network traffic. We have the right to know where our data is being sent, and what data is being sent.

      Meanwhile I've always found it amusing that there's a loud, probably corporate-owned/Big-Tech-brainwashed subset of the "security" crowd who complains about MITM proxies.

      • hn_go_brrrrr a day ago ago

        Are the MitM proxies the braindead ones that are hampering the evolution of SSL? Because those are terrible, no corporate shilling required.

    • jacquesm a day ago ago

      > I recall during COVID it was discovered that Zoom was sending traffic to China.

      Yes it was. Imagine, all those (lower) governments holding crisis meetings and sending the video and audio to China. What are the chances that all that stuff was recorded. Nice training data for some deepfakes.

  • Cider9986 a day ago ago

    Some previous discussion. I think this one is worth a read as well, though.

    https://news.ycombinator.com/item?id=47555556 https://news.ycombinator.com/item?id=47577761

  • drnick1 a day ago ago

    I filter the vast majority of adware such as doubleclick.net right at the DNS level. Not that I would use the app anyway...

    It's shocking how many third party connections an average website opens. It's particularly true for news websites. Interestingly, atomic.computer also attempts to load Cloudflareinsights and some Google fonts, both of which are denied on my network. This is precisely the kind of requests that make it trivially possible for Google to follow people around the Internet, and the vast majority of webmasters are complicit of this.

  • pratyushsood a day ago ago

    Government apps should absolutely be held to a higher standard than consumer B2C apps. Loading Google Fonts is one thing — sending telemetry to OneSignal and Facebook from an official government app is a different conversation entirely.

    In Australia, apps handling government data must comply with the PSPF (Protective Security Policy Framework) and the ISM, which explicitly restrict data flows to untrusted third parties. A government app routing 77% of requests externally would fail an IRAP assessment on day one.

    The fix is straightforward: self-host fonts, use first-party analytics, and treat every external request as a data exfiltration vector. Government digital teams know how to do this — the question is whether anyone is actually reviewing the network behavior post-deployment

    • halJordan 11 hours ago ago

      They actually are held to a higher standard. We just dont follow standards in this admin.

    • JumpCrisscross a day ago ago

      > Government apps should absolutely be held to a higher standard than consumer B2C apps

      Honestly—why? What is in this traffic that mandates heightened scrutiny? It strikes me as simply about brand.

      • longislandguido a day ago ago

        Despite all the sneed on display, it's currently #4 in the App Store (ahead of Threads, Gmail, and Google Maps) and #1 in News so they did something right.

        Personally, I want the most stringent CORS settings to read about his gold Sharpie pens.

        • JumpCrisscross 21 hours ago ago

          > it's currently #4 in the App Store (ahead of Threads, Gmail, and Google Maps) and #1 in News so they did something right

          Not disagreeing. But why should its provenance force a higher standard? It’s a glorified news app, to my understanding. Is its breaching worse for national security than some weather app that had its moment in the sunlight?

          • LocalH 19 hours ago ago

            Because it is at some level officially backed by the White House. That alone brings higher scrutiny.

            • s1artibartfast 12 hours ago ago

              That is a reassertion of the same claim. What is the reason why?

  • gruez a day ago ago

    So like... most b2c apps out there? I checked app privacy report for a few such apps I have installed and also got a very high proportion of third party domains. Maybe not as high as 77% but definitely above 50% (ie. more domains are third party than first party). The most surprising part here is them refusing to put correct info in the "data collected" section of the app store listing.

    edit: they seemed to have updated the store listing, so the "data collected" section is correct.

    • tr_user a day ago ago

      [flagged]

      • gruez a day ago ago

        No. Stop putting words in my mouth.

        • mattbuilds a day ago ago

          No one put words in your mouth, they asked you a question. You are the one who made the initial comparison to B2C apps, so it seems like a fair question to me. Your comment implies that its standard and the app isn't doing anything out of the ordinary when I think most people would except an official government app to be held to a higher standard than the average B2C app.

          • gruez a day ago ago

            >You are the one who made the initial comparison to B2C apps, so it seems like a fair question to me.

            The relevant part of B2C is the 2C part, not the B. Mass market apps are generally ridden with telemetry and SDKs. Moreover I'm not sure how you think it's a "fair question" to go from a remark about how other apps are equally bad, to thinking I want the US government to operate as a business. It's like doing:

            A: "I called the IRS and was put on hold for 2 hours, can you believe that?"

            B: "To be fair that's the experience calling into most businesses, like banks or the cable company"

            A: "Wow so you think we should be running the IRS like a bank?"

            >I think most people would except an official government app to be held to a higher standard than the average B2C app.

            Is this a "yes, in an ideal world that's how things should be" type of statement, or are you claiming "yes, government agencies have a track record of delivering technical excellence on software projects, and this particular project was especially bad"? The former is basically a meaningless platitude, and I don't think anyone seriously thinks the latter is true.

        • neya a day ago ago

          It's a classic deflection tactic - when they can't refute you by merit, they answer something with a question that is completely different about what was said - BOOM, the discussion is now about something else, completely different from the original issue. I honestly can't tell if it's bots or humans these days doing this a lot, but they're getting pretty good at it.

      • jmalicki a day ago ago

        The government should outsource way more of their traffic to third parties than a business should, since the government is inefficient, right?

        • amazingman a day ago ago

          Poe's Law strikes again. I legitimately can't tell if this is sarcasm.

          • jmalicki a day ago ago

            It is sarcasm. I always get screwed by Poe's law, since dry sarcastic parodies of extremist views is one of my favorite methodologies for producing humor.

    • dwattttt a day ago ago

      I'm happy to be against both the white houses' 3rd party telemetry as well as other apps. I can multitask.

    • iterateoften a day ago ago

      A government app being built like b2c is exactly the problem

      • gruez a day ago ago

        I'm sure that HN's preferred app would be <5MB, and has zero third party SDKs or telemetry, but half a dozen SDKs and third party domains is basically most mass market apps these days. Is it bad? Yes, but the whitehouse isn't being egregiously bad, but "whitehouse app is bad, just like most other apps" isn't going to get clicks.

        • abustamam a day ago ago

          "everything else sucks too" is not a great defense for the US govt.

          • gruez a day ago ago

            If only. It would be a far better state of of affairs if the US government sucks like every other first world country. No other first country are waging war in the middle east, having paramilitary forces terrorize residents, or are undergoing a partial government shutdown.

          • charcircuit a day ago ago

            Just because an app embeds YouTube instead of creating their own video hosting solution that does not mean that does not mean that the app sucks.

            • abustamam a day ago ago

              I didn't mention anything about YouTube.

              • charcircuit 20 hours ago ago

                This thread is about how there are too many requests to third parties for the app. Half of them are for YouTube.

                • abustamam 15 hours ago ago

                  Even if we eliminate the YouTube half it's still too many.

        • aplummer a day ago ago

          See gov.uk for a good example

          • ozlikethewizard 17 hours ago ago

            For all our faults I am geniunely impressed by gov.uk. its not pretty, its not particularly fast, and its certainly not flashly, but I've never once not been able to find what I needed or have a flow not work.

        • SV_BubbleTime a day ago ago

          Oh, sorry you missed Exlir and WASM, and rust and programming socks of course. Half credit.

    • refulgentis a day ago ago

      Right, the White House is collecting data and sending it to Huawei, and overall collection rate is worse than any other app you’ve seen by a wide margin.

      That makes me net more surprised after reading your comment.

      You're not surprised the white house is worse than any other app you've seen by 20%?

  • _heimdall a day ago ago

    Don't get me wrong, the government requires a high level of scrutiny.

    I would be interested to see how this compares to industry standard though, 77% doesn't seem outrageous to me given all the trackers and advertising code I've seen over the years. It wouldn't surprise me if this is inline with many apps people install and don't think twice about.

  • ddxv a day ago ago

    Browse the SDKs it's using as well:

    https://appgoblin.info/apps/gov.whitehouse.app/sdks

  • kevincloudsec 12 hours ago ago

    the privacy manifest declares no data collected while the app sends your device model, ip address, session count, and a persistent tracking id to onesignal on every launch. false attestation anyone?

  • vjvjvjvjghv a day ago ago

    Ads are coming next.

  • gnerd00 a day ago ago

    is location tracking part of OneSignal ? no mention of the other location services in this writeup ?