Chat perfect girl sex - Secure dating

Searching for one’s destiny online — be it a lifelong relationship or a one-night stand — has been pretty common for quite some time. To find the ideal partner, users of such apps are ready to reveal their name, occupation, place of work, where they like to hang out, and lots more besides.

Dating apps are often privy to things of a rather intimate nature, including the occasional nude photo. Kaspersky Lab decided to put them through their security paces.

All of the other apps indicate the distance between you and the person you’re interested in.

secure dating-11secure dating-32secure dating-34

Such data is not only viewable, but also modifiable.

For example, it’s possible for a third party to change “How’s it going? Mamba is not the only app that lets you manage someone else’s account on the back of an insecure connection. However, our researchers were able to intercept Zoosk data only when uploading new photos or videos — and following our notification, the developers promptly fixed the problem.

For example, Tinder, Happn, and Bumble let anyone see a user’s specified place of work or study.

Using this information, it’s possible to find their social media accounts and discover their real names.

Almost all online dating app servers use the HTTPS protocol, which means that, by checking certificate authenticity, one can shield against MITM attacks, in which the victim’s traffic passes through a rogue server on its way to the bona fide one.

The researchers installed a fake certificate to find out if the apps would check its authenticity; if they didn’t, they were in effect facilitating spying on other people’s traffic.As such, the researchers were able to get authorization tokens for social media from almost all of the apps in question.The credentials were encrypted, but the decryption key was easily extractable from the app itself.Tinder, Bumble, Ok Cupid, Badoo, Happn, and Paktor all store messaging history and photos of users together with their tokens.Thus, the holder of superuser access privileges can easily access confidential information.This concerns only Android-based devices; malware able to gain root access in i OS is a rarity.

Tags: , ,