TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

How I was able to track the location of any Tinder user

180 pointsby rkudeshiabout 11 years ago

23 comments

discostringsabout 11 years ago
It&#x27;s a horrible shame that many developers don&#x27;t think through the consequences of their implementations before publishing services that trade in personal information. The technique published in this disclosure, as well as the fact that the service sent users&#x27; exact coordinates before July, should have been some of the most obvious concerns in building a service that shares one&#x27;s picture while purporting to keep one&#x27;s identity and location hidden.<p>Is Tinder still sending date of birth instead of a calculated age, like in the API example? It seems that no one there has given any thought at all to this topic other than to splash some water at the earlier fire. (IncludeSecurity, could you let us know whether Tinder is still sending the birth date data?)<p>I can understand that many people don&#x27;t think through the consequences of sharing personal information, but it&#x27;s hard to believe how many developers dealing with other people&#x27;s information give it so little thought as well.
评论 #7266030 未加载
评论 #7266142 未加载
评论 #7266402 未加载
herbigabout 11 years ago
The biggest privacy vulnerability for dating services is a simple reverse image search. The majority of users use the same images for their dating service as they do for every other social network.<p>Once you&#x27;ve found their Twitter&#x2F;Instagram&#x2F;whatever, then you have a name. Now you have their Facebook profile.
评论 #7266319 未加载
评论 #7266349 未加载
sumnuluabout 11 years ago
If their fix uses random noise per api call they are again vulnerable (just take the average of the each result).<p>Also again reduced precision on the reported distance won&#x27;t fix the issue, you can sweep the map for changes in the last digit (by changing the attackers reported position)<p>They must reduce the precision of the users input not the reported distances precision.<p>ps. the problem in here is the accuracy not the precision
评论 #7266872 未加载
elwellabout 11 years ago
This is a really beautiful hack. Not just some SQL injection run-of-the-mill vulnerability. Very clever.
评论 #7266474 未加载
midas007about 11 years ago
Another enormous hole in app privacy is that mobile devices tend to store <i>location and compass bearing</i> in addition to handset model <i>in every photo taken with the camera</i>.<p>So if you run a web or mobile app, scrub these on receipt by re-rasterizing (load .jpg&#x2F;png -&gt; copy image data -&gt; save to a new file) using something like ImageMagick.
supercoderabout 11 years ago
Tinder should never known the users exact location anyway. They should be asking the device for a far less accurate coordinate.
Skryptabout 11 years ago
How could you even prevent this vulnerability?<p>As long as the undocumented API is publicly accessible, and Tinder intends on reporting a users distance to each other (4.5 miles), it will always be possible to triangulate the position.<p>The only thing I can think of is to obfuscate the user ID in a way that you cant use the ID to guarantee a lookup of the same user.
评论 #7269992 未加载
评论 #7268820 未加载
评论 #7267896 未加载
doktrinabout 11 years ago
That&#x27;s some good work. It&#x27;s a pity Tinder barely acknowledged the assistance.
评论 #7267954 未加载
tyhoabout 11 years ago
Their &quot;fix&quot; will do nothing to prevent location information leaking. Making more accounts and getting more distances will increase the precision just as seeing more satellites increases GPS position. No matter how much noise they add, they will always be vulnerable to this attack in the same way with enough time, even the most subtle timing attack will be exploitable.<p>There is a way they can fix it properly though. What they need to do is report the actual position of the user, not the position relative to a position you give it. This may seem less secure but if it gave that latitude and longitude to within 3 miles, for example, it would be impossible to locate a user more precise than that.
评论 #7267334 未加载
dmurabout 11 years ago
&quot;January 1st 2014 - We look at the server-side traffic to see if the same issue exists and see that the high precision data is no longer being returned by the server (awesome looks like a fix!)<p>&quot;February 19th 2014 - As the issue does not seem to be reproducible and we have no updates from the vendor....blog post published.&quot;<p>So, this has been fixed now? The rest of the post wasn&#x27;t very clear about that.
评论 #7266018 未加载
评论 #7266021 未加载
tmshabout 11 years ago
I was actually messing around with something similar (using only the radius information) a couple of weekends ago. In case anyone is curious. Node project just pushed to github:<p><a href="https://github.com/tmsh/guess-city-on-radius" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;tmsh&#x2F;guess-city-on-radius</a>
Cthulhu_about 11 years ago
So why again isn&#x27;t this personal information transferred over HTTPS? Secure connections should be enabled by default for every webservice or API, ever. For starters.
mikeleeorgabout 11 years ago
I love that they published a &quot;Vulnerability Disclosure Timeline&quot; and waited for the company to patch the vulnerability before publishing this blog post.
Johnieabout 11 years ago
Just curious, would SSL have helped in this situation?
评论 #7268378 未加载
jvdhabout 11 years ago
Kudos to you for keeping this vulnerability secret and waiting for a fix. You&#x27;ve been waiting for a fix for almost three months, and without much of a response from the side of Tinder. And the latter I think is even more frustrating than the first.<p>Having been in a similar situation, I don&#x27;t think I would have waited as long as you did.
jw2013about 11 years ago
I can&#x27;t believe they don&#x27;t do a simple fix that can be done in less than a minute. This is a serious information leaking issue. The time they spent on replying emails to the author are long enough for just get the fix done.
foldorabout 11 years ago
Funny, I was just pondering if this would work yesterday. Glad to hear that it&#x27;s been mitigated to be less accurate.
Nicholas_Cabout 11 years ago
I&#x27;ve always wondered if this could work, but I thought surely apps don&#x27;t send the exact coordinates of a user.
评论 #7266819 未加载
squigs25about 11 years ago
Really interesting - this exploit could apply to any social app that tells you the distance between you and another user
评论 #7266060 未加载
panziabout 11 years ago
Yeah, deviantart had that problem at some point as well (if you gave deviantart your position).
harlanlewisabout 11 years ago
To read, inspect &lt;body&gt; and disable {font-family: FontAwesome}.
评论 #7265968 未加载
评论 #7265872 未加载
评论 #7265844 未加载
评论 #7265934 未加载
erichoceanabout 11 years ago
Anyone have a link to the previous vulnerability (from July 2013)?
koevetabout 11 years ago
Securing the channel with SSL should fix the issue, no?
评论 #7266631 未加载
评论 #7266744 未加载
评论 #7266645 未加载