Data security: Tinder-hackers know who wipes away

The dating app is vulnerable: profile photos are unencrypted and in the same WLAN you can track who is wiping on Tinder to the right or left.

Data security: Tinder-hackers know who wipes away

Left, left, left, right, left. Older readers may still be on Marschierendenken, younger ones know: it's about Tinder. The app, in which profiles and photos of potential dating fellows on mobile display to right (like) or left (I do not like) wiped – with goal that it comes to match – is now used every day by ten million people. And she's insecure.

Reporting Sicherheitsforscherdes Israeli company Checkmarx. According to ir analysis, attackers may be able to see exactly who is wiping to left or right in which profile image, and even injecting ir own photos, thus spreading unangebrachteInhalte, advertising, or or malicious code. The messages that users send to each or through app, or account information of logged in could not be accessed, writing researchers. But gap is rich, for example, to create a profile about – even sexual – preferences of a particular user.

Getting a glimpse into Tinder activities of a user is surprisingly easy. The attackers must be sichlediglich in same WLAN (who is not affected by DieMobilfunkverbindung tindert), i.e. in GleichenFirmennetzwerk, in wireless network of a hotel or in a public hotspot.

Profile Photos Transfers Tinder unencrypted

Both in Android and of iOS version of its app, Tinder waives HTTPS protocol when transferring photos to Eineverschlüsselte connection. In browser, ManHTTPS detects connections to lock that is displayed in Address bar. Data, such as those transmitted in case of purchases or online banking, are thus verschlüsseltund cannot be easily intercepted and read. Even in mobile apps, HTTPS is now standard for user data.

In case of Tinder photos, this is not case. Attackers who traffic in a WLANanalysieren can refore closely track which user or user is viewing what profile picture. And because a negative left swipe transmits 278 bytes and a positive right-hand swipe of 374 bytes, researchers at Checkmarxsehen were able to respond to proposed partner searchers. With EinerTestsoftware called Tinderdrift you show in a video Wieeinfach that goes.

The online magazine Wired Sagteein spokesman of Tinder, browser-based version of Dienstesunterstütze already HTTPS and man plan to extend security precautions to apps. Checkmarx also recommends company to DieÜbertragung of likes and denials with additional Datenrauschenanzufüttern.

Or dating apps are also insecure

Tinder also told Wired that profile photos DerNutzer are already public – app is referring to information reallocations linked Facebook account. That is true, but interactions with or users should, of course, not also be public. Even if Essich is a oretischesSzenario in attacks presented as so often, Tinder should not dispense with such widespread encryption WieHTTPS.

This also applies to andereDating platforms. As early as last October, experts VonKaspersky discovered that many apps do not take it very seriously with security. Both at Tinder and OK Cupid, Badoo and Happn, y found out how easy it is to get some private information from transferred data, such as link to linked Instagram profiles Odersogar The current location of users, which is stalking or Worse.

In many cases, Schriebendie security researchers back n, this is because of a lack of HTTPS encryption. Inzwischenhaben Some services on this point. But if you use dating apps, Sichweiterhin should be aware of one thing: Maybe not only dieMitbürger in crowded subway during perky wipe over dieSchulter – but also voyeuristic hackers.

Date Of Update: 25 January 2018, 12:03
NEXT NEWS