Live
Black Hat USAAI BusinessBlack Hat AsiaAI BusinessBeyond the Hype: A Developer's Guide to Practical AI IntegrationDEV CommunityPreliminary Explorations on Latent Side Task UpliftLessWrong AIcarbon offset arbitrage opportunityLessWrong AIShootMesh-AI: A Transparent “Production Office” for Staged Film-and-TV DaysDEV Community5 Products You Can Build with the Afriex Cross-Border Payment APIDEV CommunityHow to Track Your Brand's Visibility in AI Search Results: A Step-by-Step FrameworkDEV CommunityCovariate Forecasting: The Next Leap in Time-Series Database CapabilitiesDEV CommunityAnthropic says Claude can now use your computer to finish tasks for you in AI agent push - MSNGoogle News: ClaudeVariance, which develops AI agents for compliance and fraud investigations, raised a $21.5M Series A led by Ten Eleven Ventures and joined by YC and others (Ryan Lawler/Axios)TechmemeWe Got Called Out for Writing AI Success Theatre — Here's What We're ChangingDEV CommunityBIAN: estructurando el negocio bancario y su encaje con DDD y microserviciosDEV CommunityWhy AI Gets Things Wrong (And Can't Use Your Data)DEV CommunityBlack Hat USAAI BusinessBlack Hat AsiaAI BusinessBeyond the Hype: A Developer's Guide to Practical AI IntegrationDEV CommunityPreliminary Explorations on Latent Side Task UpliftLessWrong AIcarbon offset arbitrage opportunityLessWrong AIShootMesh-AI: A Transparent “Production Office” for Staged Film-and-TV DaysDEV Community5 Products You Can Build with the Afriex Cross-Border Payment APIDEV CommunityHow to Track Your Brand's Visibility in AI Search Results: A Step-by-Step FrameworkDEV CommunityCovariate Forecasting: The Next Leap in Time-Series Database CapabilitiesDEV CommunityAnthropic says Claude can now use your computer to finish tasks for you in AI agent push - MSNGoogle News: ClaudeVariance, which develops AI agents for compliance and fraud investigations, raised a $21.5M Series A led by Ten Eleven Ventures and joined by YC and others (Ryan Lawler/Axios)TechmemeWe Got Called Out for Writing AI Success Theatre — Here's What We're ChangingDEV CommunityBIAN: estructurando el negocio bancario y su encaje con DDD y microserviciosDEV CommunityWhy AI Gets Things Wrong (And Can't Use Your Data)DEV Community

We intercepted the White House app's traffic. 77% of requests go to 3rd parties

Hacker News Topby donutpepperoniApril 1, 20261 min read0 views
Source Quiz

Article URL: https://www.atomic.computer/blog/white-house-app-network-traffic-analysis/ Comments URL: https://news.ycombinator.com/item?id=47595865 Points: 54 # Comments: 15

This is a follow-up to our static analysis of the White House iOS app. In that post, we decompiled the app and documented what the code could do. Critics fairly pointed out that compiled code doesn’t mean active code.

So we set up a MITM proxy and watched what the app actually sends.

Setup

We installed mitmproxy on a Mac, configured an iPhone to route traffic through it, and installed the mitmproxy CA certificate on the device. Then we opened the White House app (v47.0.4, build 81) and browsed every tab: Home, News, Live, Social, and Explore.

All HTTPS traffic was decrypted and logged. No modifications were made to the traffic. The app was used as any normal user would use it.

On a single browsing session across all tabs, the app made requests to 31 unique hosts (excluding iOS system traffic):

Host Requests What It Is

www.whitehouse.gov 48 WordPress API (news, home, wire, priorities, galleries, live)

www.youtube.com 25 YouTube embeds

phosphor.utils.elfsightcdn.com 19 Elfsight utility scripts

static.elfsight.com 12 Elfsight static assets

storage.elfsight.com 10 Elfsight file storage

api.onesignal.com 9 OneSignal analytics and user profiling

i.ytimg.com 9 YouTube video thumbnails

rr6—.googlevideo.com 9 Google Video CDN

scontent-lax7-1.xx.fbcdn.net 7 Facebook CDN (images)

pbs.twimg.com 7 Twitter/X images

apis.google.com 7 Google APIs

widget-data.service.elfsight.com 6 Elfsight widget data

core.service.elfsight.com 4 Elfsight boot API (the two-stage loader)

video-proxy.wu.elfsightcompute.com 4 Elfsight video proxy

img.youtube.com 4 YouTube thumbnails

yt3.ggpht.com 3 YouTube channel avatars

clients3.google.com 3 Connectivity check

scontent-lax3-1.xx.fbcdn.net 3 Facebook CDN

fonts.gstatic.com 2 Google Fonts

jnn-pa.googleapis.com 2 Google APIs

scontent-lax3-2.xx.fbcdn.net 2 Facebook CDN

www.google.com 2 Google

googleads.g.doubleclick.net 1 Google Ads / DoubleClick tracking

static.doubleclick.net 1 Google Ads

accounts.google.com 1 Google authentication

universe-static.elfsightcdn.com 1 Elfsight CDN

elfsightcdn.com 1 Elfsight CDN (platform.js)

cdnjs.cloudflare.com 1 Cloudflare CDN

ssl.gstatic.com 1 Google static

yt3.googleusercontent.com 1 YouTube

www.gstatic.com 1 Google static

Of the 206 app-initiated requests captured (excluding iOS system traffic), only 48 (23%) went to whitehouse.gov. The other 158 (77%) went to third-party services including Elfsight, OneSignal, YouTube, Google DoubleClick, Facebook, and Twitter.

What OneSignal Receives

This is no longer speculation from symbol analysis. This is the actual decrypted HTTPS request body sent to api.onesignal.com on app launch:

{  "properties": {  "language": "en",  "timezone_id": "America/[REDACTED]",  "country": "US",  "first_active": 1774908688,  "last_active": 1774909124,  "ip": "[REDACTED]"  },  "identity": {  "onesignal_id": "[REDACTED]"  },  "subscriptions": [  {  "id": "[REDACTED]",  "session_time": 61,  "session_count": 3,  "sdk": "050500",  "device_model": "iPhone[REDACTED]",  "device_os": "[REDACTED]",  "rooted": false,  "app_version": "47.0.4",  "net_type": 1,  "carrier": ""  }  ] }

On a single app launch, OneSignal receives:

  • Your language and timezone (narrows you to a region)

  • Your country

  • Your IP address (full IPv6 or IPv4, we observed both)

  • When you first opened the app and when you were last active (exact timestamps)

  • Your device model and OS version (device fingerprint)

  • Whether you’re on WiFi or cellular

  • Your carrier

  • Whether your device is jailbroken

  • How many times you’ve opened the app

  • How long you spent in each session (in seconds)

  • A persistent unique identifier that tracks you across sessions

The app sent multiple PATCH requests to OneSignal on each launch, updating your profile with session counts, session time, and device metadata. In our first capture (launch only), we observed 18 PATCH requests. In our full browsing session, we observed 9 total OneSignal requests including GETs and PATCHes.

The sequence is telling: on launch, the app first performs a GET to fetch your existing profile from OneSignal’s servers, then sends PATCH requests to update it. In our captures, the GET returned a profile with an IPv6 address from a previous session. The subsequent PATCHes updated it to our current IPv4 address. This means OneSignal maintains a persistent profile that tracks your IP address changes over time. Every time you open the app from a different network, your new IP is logged against the same persistent identifier.

The User-Agent header identifies the traffic: WhiteHouse/81 CFNetwork/3860.400.51 Darwin/25.3.0

13 Elfsight Domains

Our static analysis found six Elfsight widgets and a two-stage JavaScript loader. The dynamic analysis confirms it. When you open the Social tab, the app contacts multiple Elfsight-controlled domains. Between our static analysis of platform.js and the live traffic capture, we observed the following:

  • elfsightcdn.com (platform.js CDN)

  • core.service.elfsight.com (boot API, returns scripts to inject)

  • static.elfsight.com (static assets)

  • storage.elfsight.com (file storage)

  • phosphor.utils.elfsightcdn.com (utility scripts)

  • universe-static.elfsightcdn.com (static CDN)

  • widget-data.service.elfsight.com (widget data service)

  • video-proxy.wu.elfsightcompute.com (video proxy)

  • cors-proxy.utils.elfsightcdn.com (CORS proxy)

  • apps.elfsight.com (apps service)

  • dash.elfsight.com (dashboard)

  • service-reviews-ultimate.elfsight.com (reviews service)

  • Domain-level cookies set on elfsight.com

The /p/boot/ requests confirm the two-stage loader in action. Each widget ID is sent to core.service.elfsight.com, which responds with widget configuration and an assets array of JavaScript files to inject. Here are the actual scripts returned by the server during our capture:

// TikTok widget -> server responds with: "assets": ["https://universe-static.elfsightcdn.com/app-releases/tiktok-feed/stable/v2.46.1/.../tiktokFeed.js"]

// Instagram widget -> server responds with: "assets": ["https://static.elfsight.com/apps/instashow/stable/.../instashow.js"]

// Facebook widget -> server responds with: "assets": ["https://static.elfsight.com/apps/facebook-feed/stable/.../facebookFeed.js"]

// YouTube widget -> server responds with: "assets": ["https://static.elfsight.com/apps/yottie/stable/.../yottie.js"]`

The app’s loadAssets function creates a element for each URL and appends it to the page. The server decides what runs. This is the two-stage loader we documented in our static analysis now confirmed in live traffic.

The response also sets cookies including elfsight_viewed_recently, Cloudflare tracking cookies (_cfuvid, _cf_bm), and session identifiers. We counted 10+ cookies set by Elfsight infrastructure during a single session.

The YouTube embeds load Google’s ad tracking infrastructure:

  • googleads.g.doubleclick.net (Google Ads)

  • static.doubleclick.net (DoubleClick ad scripts)

DoubleClick is Google’s ad serving and tracking platform. Its presence means Google’s advertising infrastructure is running inside the official White House app, tracking user engagement with video content. This was not disclosed in the privacy manifest.

The Privacy Manifest vs. Reality

NSPrivacyCollectedDataTypes: [] NSPrivacyTracking: false

In a single browsing session, the app:

  • Sent your device model, OS, IP address, timezone, language, session count, session duration, and a persistent unique identifier to OneSignal (a third-party analytics company)

  • Contacted 13 Elfsight-controlled domains and received 10+ tracking cookies

  • Loaded Google DoubleClick ad tracking infrastructure

  • Made requests to Facebook CDN, Twitter/X CDN, YouTube, and Google APIs

The privacy label says “No Data Collected.”

Methodology

  • Proxy: mitmproxy (mitmdump) on macOS

  • Device: iPhone running iOS, connected to same WiFi network

  • Certificate: mitmproxy CA installed and trusted in iOS Certificate Trust Settings

  • Capture: Full HTTPS decryption of all app traffic

  • Duration: Single browsing session across all five tabs (Home, News, Live, Social, Explore)

  • Modifications: None. Traffic was observed, not altered.

  • Personal data: All IP addresses, device identifiers, and OneSignal IDs have been redacted from this post.

No servers were probed. No traffic was modified. We watched what the app sends on its own.

  • Static analysis of the White House iOS app (our original post)

  • Thereallo’s analysis of the Android version

About

Atomic Computer provides cybersecurity, infrastructure, and development services. If you need a security assessment of your mobile app, get in touch.

Have a question about this, or a project you're working on?

Schedule a call Contact us

Was this article helpful?

Sign in to highlight and annotate this article

AI
Ask AI about this article
Powered by AI News Hub · full article context loaded
Ready

Conversation starters

Ask anything about this article…

Daily AI Digest

Get the top 5 AI stories delivered to your inbox every morning.

More about

analysis

Knowledge Map

Knowledge Map
TopicsEntitiesSource
We intercep…analysisHacker News…

Connected Articles — Knowledge Graph

This article is connected to other articles through shared AI topics and tags.

Knowledge Graph100 articles · 205 connections
Scroll to zoom · drag to pan · click to open

Discussion

Sign in to join the discussion

No comments yet — be the first to share your thoughts!

More in Products