| ▲ | vineyardmike 6 hours ago | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
> The official White House Android app has a cookie/paywall bypass injector, tracks your GPS every 4.5 minutes (9.5m when in background), and loads JavaScript from some guy's GitHub Pages (“lonelycpp” is acct, loads iframe viewer page). Doesn’t seem too crazy for a generic react native app but of course coming from the official US government, it’s pretty wide open to supply chain attacks. Oh and no one should be continually giving the government their location. Pretty crazy that the official government is injecting JavaScript into web views to override the cookie banners and consent forms - it is often part of providing legal consent to the website TOS. But legal consent is not their strong suit I guess. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| ▲ | trimethylpurine 5 hours ago | parent [-] | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Aren't the banners for EU page visitors. I don't think there is a US law about this, is there? | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||