Is internet dating apps safer? We have been always entrusting matchmaking software with these innermost strategies

. just how thoroughly perform they treat this records?

Oct 25, 2017

Seeking one’s fate on the web — whether it is a lifelong connection or a one-night stand — happens to be fairly common for quite a while. Relationships programs are increasingly being element of our everyday life. To get the perfect companion, users of such applications are quite ready to unveil their unique title, profession, workplace, in which they prefer to hang around, and substantially more besides. Relationship apps in many cases are aware of issues of a rather close nature, like the unexpected topless photo. But how carefully create these apps handle this type of information? Kaspersky laboratory chose to place them through their particular safety paces.

The pros read the most famous cellular internet dating applications (Tinder, Bumble, OkCupid, Badoo, Mamba, Zoosk, Happn, WeChat, Paktor), and recognized the main dangers for consumers. We informed the designers ahead of time about the vulnerabilities detected, and by enough time this book was released some have been already solved, among others are planned for modification soon. However, not every designer promised to patch most of the flaws.

Risk 1. who you really are?

Our very own researchers found that four associated with the nine applications they investigated allow possible attackers to figure out who’s covering up behind a nickname centered on data provided by consumers by themselves. For instance, Tinder, Happn, and Bumble leave people discover a user’s given office or research. By using this records, it is feasible to find her social media marketing accounts and find out their own real brands. Happn, in particular, makes use of Facebook makes up about information trade because of the servers. With reduced efforts, anyone can see the brands and surnames of Happn people as well as other information using their myspace users.

Whenever people intercepts traffic from your own tool with Paktor setup, they could be astonished to find out that they can see the e-mail address of additional software customers.

Looks like you can recognize Happn and Paktor customers various other social networking 100percent of times, with a 60percent rate of success for Tinder and 50per cent for Bumble.

Threat 2. In which will you be?

If someone wants to learn your whereabouts, six with the nine programs will lend a hand. Only OkCupid, Bumble, and Badoo hold consumer place data under lock and trick. The many other software suggest the exact distance between both you and the individual you’re contemplating. By active and signing data concerning the length amongst the couple, it’s an easy task to decide the actual location of the “prey.”

Happn besides demonstrates just how many yards divide you against another user, but in addition the wide range of period their routes has intersected, rendering it less difficult to trace some one down. That’s in fact the app’s main function, since incredible once we believe it is.

Threat 3. exposed facts transfer

Many apps move information toward host over an SSL-encrypted route, but there are exclusions.

As our very own researchers realized, one of the more vulnerable software contained in this value try Mamba. The analytics component included in the Android version will not encrypt information concerning tool (unit, serial number, etc.), plus the iOS type connects for the server over HTTP and exchanges all information unencrypted (and therefore exposed), communications incorporated. This type of information is just readable, but also modifiable. As an example, it’s possible for a 3rd party to switch “How’s it supposed?” into a request for money.

Mamba isn’t the just software that enables you to regulate somebody else’s levels regarding back of a vulnerable hookup. So really does Zoosk. However, the scientists had the ability to intercept Zoosk information only once uploading brand-new photos or videos — and following our very own notice, the developers rapidly solved the challenge.

Tinder, Paktor, Bumble for Android os, and Badoo for apple’s ios in addition upload photos via HTTP, which enables an opponent to learn which profiles her possible prey try exploring.

While using the Android versions of Paktor, Badoo, and Zoosk, different facts — for example, GPS information and unit info — can result in an inappropriate arms.

Threat 4. Man-in-the-middle (MITM) combat

Just about all internet dating application hosts use the HTTPS method, meaning that, by examining certification credibility, one can shield against MITM assaults, wherein the victim’s site visitors goes through a rogue servers returning towards the real one. The experts set up a fake certification to find out in the event that software would examine its authenticity; when they didn’t, they were in effect facilitating spying on additional people’s visitors.

They proved that most software (five from nine) are in danger of MITM assaults because they do not validate the authenticity of certificates. And almost all of the software approve through Facebook, therefore the diminished certificate verification can result in the theft on the short-term consent type in the type of a token. Tokens are appropriate for 2–3 weeks, throughout which opportunity attackers have access to a few of the victim’s social networking account facts along with complete access to their particular profile regarding the dating software.

Threat 5. Superuser legal rights

No matter the specific type of data the app sites regarding the device, this type of data is accessed with superuser liberties. This problems only Android-based devices; trojans in a position to gain root accessibility in apple’s ios was a rarity.

The result of the analysis is less than encouraging: Eight of the nine applications for Android are ready to provide too much information to cybercriminals with superuser access rights. Therefore, the researchers had the ability to see agreement tokens for social media marketing from most of the programs under consideration. The recommendations comprise encoded, but the decryption key got easily extractable through the application itself.

Tinder, Bumble, OkCupid, Badoo, Happn, and Paktor all store messaging record and images of people as well as their tokens. Thus, the holder of superuser accessibility privileges can very quickly access private records.


The research showed that lots of matchmaking software don’t handle people’ sensitive information with sufficient attention. That’s absolutely no reason not to use these types of providers — you just need to comprehend the difficulties and, in which possible, reduce the risks.