Cargando…

What’s really ‘Happning’? A forensic analysis of Android and iOS Happn dating apps

With today’s world revolving around online interaction, dating applications (apps) are a prime example of how people are able to discover and converse with others that may share similar interests or lifestyles, including during the recent COVID-19 lockdowns. To connect the users, geolocation is ofte...

Descripción completa

Detalles Bibliográficos
Autores principales: Knox, Shawn, Moghadam, Steven, Patrick, Kenny, Phan, Anh, Choo, Kim-Kwang Raymond
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Elsevier Ltd. 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7252105/
https://www.ncbi.nlm.nih.gov/pubmed/32501313
http://dx.doi.org/10.1016/j.cose.2020.101833
Descripción
Sumario:With today’s world revolving around online interaction, dating applications (apps) are a prime example of how people are able to discover and converse with others that may share similar interests or lifestyles, including during the recent COVID-19 lockdowns. To connect the users, geolocation is often utilized. However, with each new app comes the possibility of criminal exploitation. For example, while apps with geolocation feature are intended for users to provide personal information that drive their search to meet someone, that same information can be used by hackers or forensic analysts to gain access to personal data, albeit for different purposes. This paper examines the Happn dating app (versions 9.6.2, 9.7, and 9.8 for iOS devices, and versions 3.0.22 and 24.18.0 for Android devices), which geographically works differently compared to most notable dating apps by providing users with profiles of other users that might have passed by them or in the general radius of their location. Encompassing both iOS and Android devices along with eight varying user profiles with diverse backgrounds, this study aims to explore the potential for a malicious actor to uncover the personal information of another user by identifying artifacts that may pertain to sensitive user data.