Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»How we found the driver’s license of users in less than 10 minutes to spill tionor
    Security

    How we found the driver’s license of users in less than 10 minutes to spill tionor

    PineapplesUpdateBy PineapplesUpdateAugust 13, 2025No Comments10 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    How we found the driver’s license of users in less than 10 minutes to spill tionor
    Share
    Facebook Twitter LinkedIn Pinterest Email

    For an app that you are allegedly dating, about spreading beans on it, it is ironic that the Toner was taking personal information of thousands of its users to the open web.

    Teaonher was designed for men to share photos and information about women they claim that they are dating. But like tea, the dating-gossip app for women, which was trying to repeat it, had pierced his safety, which highlighted the personal information of his users, including their driver’s license and pictures of other government identity documents issued by the government, as TECRICRINCH said last week.

    Apps, such as these gaudd communities, were built oily to share information about their relationships under the guise of personal safety. However, poor coding and safety defects highlight the ongoing privacy risks contained in the need to submit sensitive information to users to use apps and websites.

    Such risks are only going to deteriorate; Popular apps and web services are already to follow age-classity laws, which require people to present their identity documents, before they can provide access to adult-themed materials, connected to people’s database of personal information despite privacy and security risks.

    When Techcrunch published our story last week, we did not publish specific details of the bugs discovered in Teaonher, incorrectly in favor of caution so that bad actors would not help exploit bug. Instead, we decided to publish a limited disclosure due to the growing popularity of the app and immediate risks when using the app.

    As at the time of disclosure, the Teaonher Apple App Store had number 2 in the free app chart, which is still a position organized by the app today.

    The flaws we have received have been solved. Techcrunch can now share how we were able to find the license of users within 10 minutes of sending a link to the app to the app store, thanks to the easy to find the flaws in the public-supported backgate system, or APIs.

    The developer of the app, Xavier Lampkin, did not respond to several requests for comment after submitting details of security defects, nor would the lamp -affected Toner be committed to informing users or state regulators of safety omissions.

    We also asked Lampkin whether any security review was done before the Toner app was launched, but we did not get any reply. (We have more on later disclosure.)

    Okay, start the clock.

    Teaonher exposed ‘administrator panel’ credentials

    Before we also download the app, we first wanted to find out where the Teaonher was hosted on the Internet after seeing its public-dominated infrastructure, such as anything hosted on its website and its domain.

    This is usually a good place to start because it helps to understand what other services are connected on the Internet.

    To find the domain name, we saw the first (coincidentally) Applisting app on Apple App Store To find the website of the app. This can usually be found in its privacy policy, which should include apps before incorporating the app. (App listing also claims that the developer “does not collect any data from this app,” which is infidelly wrong, so take it as you want.)

    Teaonher’s privacy policy was in the form of a published Google Doc, including an email address teaonher.com Domain, but no website.

    The website was not public at the time, so with no website loading, we saw the domain-making DNS records, which can help identify what more hosted on the domain, such as email server or web hosting types. We wanted to look for any public sub-domain, which can use to host functionality for the developer app (or host other resources that must not be public), such as administrator dashboard, database, or other web-festing services.

    But when we saw the public internet record of Teaonher, it had no meaningful information other than the same subdoman, appserver.teaonher.com,

    When we opened this page in our browser, what was loaded was the landing page for Teaonher’s API (for the curious, We uploaded a copy hereAn API only allows things to communicate with each other on the Internet, such as connecting the app to its central database.

    It was on this landing page that we found the exposed email address and plaintext password (which) It was not away from “password”) To reach “admin panel” for lampkin account.

    The API page has shown that the system used for the document verification system and user management was located on the “Localhost”, which refers to the physical computer running only the server and cannot be directly accessible from the Internet. It is not clear whether any administrator could use credentials to reach the panel, but it was a sufficiently dangerous discovery in itself.

    At this point, we were in only two minutes.

    Otherwise, the API landing page did not do much except to indicate what the API can do. The page has listed several API andpoints, which the app needs to access to function, such as retriencing user records from Tioner’s database, to leave reviews and send information to users.

    With the knowledge of these closing points, it can be easy to interact directly with the API, as we were copying the app. Each API is different, so learning can take time to find out how an API works and how to communicate with someone, such as which endpoints have to use and its language requires the parameters required to speak effectively. Apps such as postman can be helpful to access and interact directly with APIs, but it requires time and some degree testing and error (and patience), when they should not do, spit the API.

    But in this case, there was an even more easy way.

    Teaonher API allows informal access to user data

    This API landing page is included A closing point is called /docsWhich included API’s auto-generated documentation (operated by a product called Swagar UI), which included a complete list of commands that could be done on API.

    This documentation page effectively was a master sheet of all the tasks that you can do on the Teaonher API as a regular app user, and more importantly, as the administrator of the app, such as creating new users, verifying the identity documents of users, modeling the comments, and more.

    The API documentation also showed the ability to query the Teaonher API and return the user data, which essentially lets us recover data from the backnd server of the app and display it in our browser.

    Although it is not uncommon for developers to publish their API documentation, the problem here was that some API requests could be done without any authentication – no password or credentials were required to return information from the Toner Database. In other words, you can run the command on the API to access the private data of users that should not be accessible to the app user, let anyone go alone on the Internet.

    All this was documented to see anyone easily and publicly.

    For example, Teaonher Identity Verification Currently requested a list of users in queue – no more than pressing a button on the API page, nothing fancy here – will not return dozens of account records on those who recently signed up to Teaonher.

    Records returned from the server of the Teaonher included unique identifiers of users within the app (essentially a string of random letters and numbers), their public profile screen name and self-reported age and location as well as their personal email addresses. Records also include web address links, including the license of the users’ driver and photos of the same selfie.

    Worse, driver’s licenses, IDs issued by the government, and selfie were stored in the Amazon-Host S3 cloud server, which are publicly accessible to anyone with their web addresses. This public setting allows anyone’s identity to open files from any restriction with any restriction.

    How we found the driver’s license of users in less than 10 minutes to spill tionor
    Two driver’s license (Related by Techcrunch) exposed by flaws in the Teaonher appImage Credit:Techcrunch (screenshot)

    With that unique user identifier, we can also use the API page to directly look at the records of individual users, which will return their account data and any of their related identity documents. With uninhabited access to API, a malicious user could scrape a huge amount of user data from the app, much as it was. Tea app to start with,

    From bean to cup, it was about 10 minutes, and we had not even logged in the app. Bugs was so easy to find out that we would not get it if no malicious is found.

    We asked, but the lampkin would not say whether he has a technical ability, such as a log, to determine if someone used API (or misused) at any time to get access to the verification documents of users, such as scrapping the web address from API.

    In the days after our report to Lampkin, the API landing page has been taken down, with its documentation page, and now it only reflects the server position that Toner API is running as “healthy”. At least on cursory tests, API now rely on authentication, and previous calls made using API no longer work.

    Web addresses with identity documents uploaded by users are also banned from public view.

    Teaonher Developer rejected efforts to disclose flaws

    Given that Teaonher had no official website at the time of our findings, Techcrunch contacted the email address listed on privacy policy in an attempt to disclose security flaws.

    But email bounced back with an error, stating that the email was not found. We also tried to contact Lampkin through email address on our website, Newvil Media, but our email rose back with the same error message.

    Techcrunch LinkedIn reached the lampkin through the message, asked him to provide an email address, where we could send details of the safety flaws. Lampkin responded with a general “support” email address.

    When Techcrunch reveals a safety defect, we first arrive to confirm that a person or company is the correct recipient. Otherwise, sending details of a safety bug to the wrong person can pose a risk. Before sharing the specific details of the flaws, we asked the recipient of the “support” email address whether it was the correct address to disclose the safety risk associated with the teaonher user data.

    “You must be confused with us with ‘The Tea App’,” Lampkin replied by email. (We did not have.) “We don’t have security violations or data leaks,” he said. (This.) “We have some bots, but we have not done too big in that conversation yet, regret that you were wrong.” (We were not.)

    Satisfied that we had established contact with the right person (although not with us not with the response received), Techchchan shared several links to the driver’s license along with safety defects, and a copy of the own data of the lamp to outline the severity of safety issues.

    “Thanks to this information. It is very related. We are now going to jump on it,” Lampkin said.

    Despite many follow -up emails, we have not heard of lampkin as we have revealed security flaws.

    It does not matter whether you have one billionaire vibi coding through one-person software shop or a weekend: developers still have the responsibility of protecting their users’ data. If you cannot keep the private data of your users safe, do not build it to start it.

    If you have proof of leaking a popular app or service or exposing information, contact. You can safely contact this reporter through an encrypted message on zackwhittaker.1337 on the signal.

    We are always looking to develop, and techcrunch and by providing some insight into our coverage and events in our perspective and response, you can help us! to fill This survey To tell us how we are doing and get a chance to win the award in return!

    drivers license minutes spill tionor users
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleMicrosoft Windows 11, Windows removes Powershell 2.0 from Server
    Next Article Pocket FM gives its writers an AI tool to change the stories, write clifhengars, and more
    PineapplesUpdate
    • Website

    Related Posts

    Startups

    Verizon outage affects more than 2 million users: What ‘SOS’ means, refunds, more updates

    January 15, 2026
    Startups

    Avoiding the iOS 26 update? 4 reasons why iPhone users should do this – ASAP

    January 13, 2026
    Startups

    Finally, Bluetooth trackers for Android users that work even better than AirTags (at a lower price)

    January 11, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2026 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.