First thing I see when I decompile the app is this, which is a broadcast receiver for "http://com.android .vending.INSTALL_REFERRER", so unfortunately they are doing it the boring non-root waypic.twitter.com/0IDg2yl1K4
You can add location information to your Tweets, such as your city or precise location, from the web and via third-party applications. You always have the option to delete your Tweet location history. Learn more
First thing I see when I decompile the app is this, which is a broadcast receiver for "http://com.android .vending.INSTALL_REFERRER", so unfortunately they are doing it the boring non-root waypic.twitter.com/0IDg2yl1K4
They tried to obfuscate whatever this class is doing and where the information is being sent by encrypting all of the strings constantspic.twitter.com/uSHLSNYzaK
Looking at the decryption method, the keys were right there, so I just made my own copy of the entire class, because I didn't feel like reimplementing Java crypto weirdness in Python.pic.twitter.com/OaDHO0yl19
I then used APKTool to grep for all instances where this method is used, extract the string constant passed to it from the smali source code and decrypt all of the strings.pic.twitter.com/OgWjg1Zi4i
So, yeah. Someone is doing something shady here and went through some effort to (badly) hide it. APK for anyone who wants to take a look themselves: https://donk.sh/d/sr2qsok82k.apk …
(i am having issues with my hosting provider so the link is unavailable atm. you can grab it yourself off apkpure)
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.