Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    It is reportedly allegedly scrapping websites, it is not believed again

    August 5, 2025

    Jeh Aerospace Net $ 11m to score the supply chain of commercial aircraft in India

    August 5, 2025

    Trump CFTC Pick Brian Quintage questioned Kalshi relations

    August 5, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Dating app raw raw users location data and personal information
    Security

    Dating app raw raw users location data and personal information

    PineapplesUpdateBy PineapplesUpdateMay 2, 2025No Comments5 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Dating app raw raw users location data and personal information
    Share
    Facebook Twitter LinkedIn Pinterest Email

    A safety omission on the dating app publicly exposed its users’ personal data and private location data, Techcrunch has found.

    The exposed data included users ‘performance names, date of birth, dating and sexual preferences associated with raw apps, as well as users’ locations. Some of the location data included coordinates that were specific to detect raw app users with road-level accuracy.

    RAW, which was launched in 2023, is a dating app that claims to offer more real conversations with others by asking users to upload daily selfie photos. The company does not state how many users it have, but its app notes to download more than 500,000 Android in listing on Google Play Store.

    The news of the security lapse comes in the same week that the startup announces its dating app, The Raw Ring, A. of A. of A. Unpounted weelable equipment This claims that the app will allow users to track their partner’s heart rate and other sensor data, which is to achieve AI-borne insight to detect infidelity.

    Despite the moral and moral issues of tracking romantic partners and Emotional surveillance riskRaw claims on its website and in his privacy policy that its app, and its unpublished device, use both end-to-end encryption, a safety feature that prevents anyone other than the user-from reaching the company including a company.

    When we tried the app this week, including analysis of the network’s network traffic, Techcrunch found no evidence that the app uses end-to-end encryption. Instead, we found that the app was publicly spreading data with any web browser about its users.

    RAW set data exposure on Wednesday, when Techcrunch approached the company with a bug details.

    Raw Dating app co-founder, Marina Anderson said,

    Asked by Techcrunch, Anderson confirmed that the company did not demonstrate the third party security audit, saying that it is “focus on the manufacture of a high quality product and to make it meaningfully confusing with our growing community.”

    Anderson would not be committed to constantly inform the affected users that their information was revealed, but said the company would submit a detailed report to the relevant data protection officers under the applied rules. “

    It is not immediately known how long the app was publicly spreading the data of its users. Anderson said the company was still investigating the incident.

    Regarding his claim that the app uses end-to-end encryption, Anderson said Raw “uses encryption in transit and applies access control to sensitive data within our infrastructure. The further steps will become clear after a thorough analysis of the situation.”

    Anderson would not say that when asked if the company is planning to accommodate its privacy policy, and Anderson did not respond to a follow -up email from Techcrunch.

    How we got the data exposed

    Techcrunch on Wednesday discovered the bug during a brief test of the app. As part of our test, we installed a rat dating app on an eternal Android device, which allows us to use the app without providing any real -world data, such as our physical place.

    We created a new user account with dummy data, such as a name and date of birth, and the location of our virtual device was configured as we were in a museum in Mountain View, California. When the app requested the location of our virtual device, we allowed the app to reach our exact location a few meters.

    We used a network traffic analysis tool to monitor and inspect the data flowing inside and out of the raw app, allowing us to understand how the app works and what type of data the app was uploaded to its users.

    Techcrunch discovered data exposure within a few minutes of using the raw app. When we first loaded the app, we found that it was pulling the user’s profile information directly from the company’s server, but this server was not protecting the data returned with any authentication.

    In practice, this means that anyone can use the personal information of another user to go to the web address of the exposed server using the web browser – api.raw.app/users/ Another app corresponds to a unique 11-conductive number to the user. To correspond to any other user’s 11-conductive identifier, replacing the digits returned private information from the user’s profile, including their location data.

    Dating app raw raw users location data and personal information
    Image Credit:Tekkachchan
    A screenshot is hovering over the mountain view, California, showing the location of the techcrunch user's profile on a map.
    Image Credit:Tekkachchan

    Such vulnerability is known as an unsafe direct object reference, or an Idor, a type of bug that can allow someone to access or modify the data on someone else’s server due to lack of proper safety check on the user.

    As we have explained earlier, for example, Idor Bugs are similar to being the key to a private mailbox, but this key can unlock every other mailbox on the same road. For example, Ider Bugs can be easily an enumeritic and in some cases, allowing access to records after a record of user data.

    The American Cyber ​​Security Agency CISA has long warned of risks that exist Idor bugs, which generally include the ability to reach the “scale”. As part of it Secured by design Initiative, CISA said 2023 in advisor Developers should ensure that their apps check proper authentication and authority.

    Since Raw has fixed the bug, the exposed server no longer gives user data in the browser.

    app data Dating information location personal raw users
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleNYT Strands Today – Answer #426 (Saturday, 3 May 2025) for Sign, Spangram and Game
    Next Article Startups Weekly: Drama or Game-Chanceer? You decide
    PineapplesUpdate
    • Website

    Related Posts

    Security

    Certain bug leaked in proton log fixes the totup secrets

    August 5, 2025
    Apps

    This app immediately blocks sensitive information from your MAC screenshot.

    August 5, 2025
    Security

    Rainmware attacks: danger of developing US financial institutions

    August 5, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    It is reportedly allegedly scrapping websites, it is not believed again

    August 5, 2025

    Jeh Aerospace Net $ 11m to score the supply chain of commercial aircraft in India

    August 5, 2025

    Trump CFTC Pick Brian Quintage questioned Kalshi relations

    August 5, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.