The White House has launched a new mobile application on major platforms designed to provide direct access to administration updates and media. Technical analysis reveals the software is a React Native framework built using Expo and WordPress, featuring a specialized script that automatically bypasses paywalls and privacy consent banners on external websites.
The recently released White House application is built using a modern development stack that relies on React Native and the Expo SDK. Beneath the surface, the app’s logic is contained within a Hermes bytecode bundle, while the backend functions through a custom WordPress REST API hosted on official government servers. Despite being a functional news portal, the underlying configuration reveals that the developers intentionally disabled over-the-air updates and included specific plugins designed to strip permissions and location tracking from the software's operation.
The core content of the application serves as a multimedia hub for administration initiatives, featuring live streams, policy galleries, and direct links to various government resources. String extraction from the compiled code highlights promotional phrases alongside functional links to official domains like TrumpRx.gov and TrumpAccounts.gov. Notably, the app also includes a direct integration for a tips form hosted by Immigration and Customs Enforcement, positioning a law enforcement reporting tool within a general news and media interface.
One of the most unusual technical discoveries within the code is a custom script designed for the app’s internal web browser. When a user opens an external link through the application, the system automatically injects JavaScript and CSS into the third-party website to modify its appearance and functionality. This code is specifically programmed to identify and remove common web elements such as cookie consent banners, GDPR notifications, and privacy management platforms that typically appear when a user first visits a site.
Beyond simple cosmetic changes, the injected script is designed to bypass restrictive hurdles on independent news and media sites. The code targets login walls, signup prompts, and digital paywalls, attempting to hide these elements so the user can access content without subscribing or registering. It further forces the webpage to allow scrolling by overriding the site’s original styling, ensuring that even if a site attempts to lock its content behind a pop-up, the app's browser will render the page as if the restriction were not there.
This aggressive approach to web browsing represents a significant departure from standard government-issued software. By using a MutationObserver to continuously monitor and delete privacy and payment elements as they load, the application provides a browsing experience that actively interferes with the business models and legal compliance tools of third-party websites. The presence of this script confirms that the application is not just a portal for government news, but a tool actively modified to strip away the standard privacy and monetization frameworks of the modern internet.
Source: https://blog.thereallo.dev/blog/decompiling-the-white-house-app


