Risk
2/14/2012
12:35 PM
50%
50%

Looking For Love? Don't Trust Online Dating Sites

When it comes to how dating websites secure and share information about their users, be sure to read the fine print, and don't be afraid to walk away.

Beware online dating websites, at least when it comes to their data privacy practices.

That warning comes by way of the Electronic Frontier Foundation (EFF), a non-profit group devoted to protecting digital rights. According to the organization, numerous dating sites--which are for-profit businesses, after all--sell data on their customers to third parties, including Google and Facebook. Furthermore, many online dating sites suffer from poor information security practices and may not delete profiles or images in a timely manner.

Online dating websites may also allow third-party search engines to index your profile. Notably, a public profile for Julian Assange, the editor in chief of WikiLeaks, was discovered in late 2010 on the free dating website OkCupid. While the site allows users to disable such indexing, even the privacy obsessed Assange apparently didn't realize that by default, all profiles are public.

[ Facebook and other social networking sites don't do enough to protect privacy, say users. See Social Media Survey: Privacy, Security Concerns Persist. ]

People might also be surprised to find that some online dating website profiles are being sold en masse to third parties. "Often, this transaction is gift-wrapped with the promise that your individual data is 'anonymized' or sold in aggregate form, yet users should be wary of such promises," said Rainey Reitman, EFF activism director, in a blog post. "Using data from social networking sites sold to advertisers, Stanford researcher Arvind Narayanan demonstrated that it's hard to truly anonymize data before it's packaged and sold."

The data being shared may also give people pause. Notably, Stanford computer science graduate student Jonathan Mayer last year released a study showing that OkCupid was selling or sharing user information with almost 30 third-party companies. That finding came from Mayer's review of the information-sharing practices of the top 250 websites listed on Quantcast.

All told, he found that 61% of the websites in his sample shared a username or user ID with a third-party website. Those third-party sites were ComScore (for 44% of the top 250 websites), Google Analytics (42%), Quantcast (34%), Google Advertising (34%), and Facebook (24%). In the case of OkCupid, shared information also included everything from age and religion to details about pets and frequency of drinking or smoking.

Leave it to a digital rights group to pour cold water on potential Valentine's Day romance? Perhaps, but by keeping an eye on online privacy practices for dating websites may offer people better long-term satisfaction.

One place to start is by reviewing a company's privacy policies to see what it promises. Also look at a company's information security history. One case in point is Grindr, a mobile app that's been embraced by the gay community. On Jan. 20, the company confirmed that there was a vulnerability in its software that could allow an attacker to access photos and messages and impersonate other users, and promised a fix "over the next few days." The company ultimately released a fix on February 10. But in the interim, security experts had recommended that the site's 3 million users temporarily delete their Grindr profiles.

Also check whether dating websites have implemented HTTPS to secure Web sessions, especially against local attackers who are sniffing packets, for example by using a tool such as Firesheep. "Our recent survey of major online dating sites found that most of them were not properly implementing HTTPS," said EFF's Reitman. "Some online dating sites offer partial support for HTTPS, and some offer none at all. This leaves user data exposed."

One Firefox plug-in that can help, she said, is HTTPS Everywhere, which is maintained by the Tor Project and EFF. The tool automatically enables HTTPS for any site that offers it. "As more dating sites begin to provide support for HTTPS, we'll expand the ruleset for HTTPS Everywhere to include those sites so you'll be better protected."

There are no silver bullets when it comes to protecting company and customer data from loss or theft, but there are technological and procedural systems that will go a long way toward preventing a WikiLeaks-like data dump. Download our How To Prevent An Online Data Dump report. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Bprince
50%
50%
Bprince,
User Rank: Ninja
2/15/2012 | 3:11:41 AM
re: Looking For Love? Don't Trust Online Dating Sites
Good advice would also be for people to read the terms of service before uploading any information.
Brian Prince, InformationWeek/Dark Reading Comment Moderator
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7421
Published: 2015-03-02
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a module name in the salg_name field, a different vulnerability than CVE-2014-9644.

CVE-2014-8160
Published: 2015-03-02
net/netfilter/nf_conntrack_proto_generic.c in the Linux kernel before 3.18 generates incorrect conntrack entries during handling of certain iptables rule sets for the SCTP, DCCP, GRE, and UDP-Lite protocols, which allows remote attackers to bypass intended access restrictions via packets with disall...

CVE-2014-9644
Published: 2015-03-02
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a parenthesized module template expression in the salg_name field, as demonstrated by the vfat(aes) expression, a different vulnerability than CVE-201...

CVE-2015-0239
Published: 2015-03-02
The em_sysenter function in arch/x86/kvm/emulate.c in the Linux kernel before 3.18.5, when the guest OS lacks SYSENTER MSR initialization, allows guest OS users to gain guest OS privileges or cause a denial of service (guest OS crash) by triggering use of a 16-bit code segment for emulation of a SYS...

CVE-2014-8921
Published: 2015-03-01
The IBM Notes Traveler Companion application 1.0 and 1.1 before 201411010515 for Window Phone, as distributed in IBM Notes Traveler 9.0.1, does not properly restrict the number of executions of the automatic configuration option, which makes it easier for remote attackers to capture credentials by c...

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.