Risk
2/14/2012
12:35 PM
50%
50%

Looking For Love? Don't Trust Online Dating Sites

When it comes to how dating websites secure and share information about their users, be sure to read the fine print, and don't be afraid to walk away.

Beware online dating websites, at least when it comes to their data privacy practices.

That warning comes by way of the Electronic Frontier Foundation (EFF), a non-profit group devoted to protecting digital rights. According to the organization, numerous dating sites--which are for-profit businesses, after all--sell data on their customers to third parties, including Google and Facebook. Furthermore, many online dating sites suffer from poor information security practices and may not delete profiles or images in a timely manner.

Online dating websites may also allow third-party search engines to index your profile. Notably, a public profile for Julian Assange, the editor in chief of WikiLeaks, was discovered in late 2010 on the free dating website OkCupid. While the site allows users to disable such indexing, even the privacy obsessed Assange apparently didn't realize that by default, all profiles are public.

[ Facebook and other social networking sites don't do enough to protect privacy, say users. See Social Media Survey: Privacy, Security Concerns Persist. ]

People might also be surprised to find that some online dating website profiles are being sold en masse to third parties. "Often, this transaction is gift-wrapped with the promise that your individual data is 'anonymized' or sold in aggregate form, yet users should be wary of such promises," said Rainey Reitman, EFF activism director, in a blog post. "Using data from social networking sites sold to advertisers, Stanford researcher Arvind Narayanan demonstrated that it's hard to truly anonymize data before it's packaged and sold."

The data being shared may also give people pause. Notably, Stanford computer science graduate student Jonathan Mayer last year released a study showing that OkCupid was selling or sharing user information with almost 30 third-party companies. That finding came from Mayer's review of the information-sharing practices of the top 250 websites listed on Quantcast.

All told, he found that 61% of the websites in his sample shared a username or user ID with a third-party website. Those third-party sites were ComScore (for 44% of the top 250 websites), Google Analytics (42%), Quantcast (34%), Google Advertising (34%), and Facebook (24%). In the case of OkCupid, shared information also included everything from age and religion to details about pets and frequency of drinking or smoking.

Leave it to a digital rights group to pour cold water on potential Valentine's Day romance? Perhaps, but by keeping an eye on online privacy practices for dating websites may offer people better long-term satisfaction.

One place to start is by reviewing a company's privacy policies to see what it promises. Also look at a company's information security history. One case in point is Grindr, a mobile app that's been embraced by the gay community. On Jan. 20, the company confirmed that there was a vulnerability in its software that could allow an attacker to access photos and messages and impersonate other users, and promised a fix "over the next few days." The company ultimately released a fix on February 10. But in the interim, security experts had recommended that the site's 3 million users temporarily delete their Grindr profiles.

Also check whether dating websites have implemented HTTPS to secure Web sessions, especially against local attackers who are sniffing packets, for example by using a tool such as Firesheep. "Our recent survey of major online dating sites found that most of them were not properly implementing HTTPS," said EFF's Reitman. "Some online dating sites offer partial support for HTTPS, and some offer none at all. This leaves user data exposed."

One Firefox plug-in that can help, she said, is HTTPS Everywhere, which is maintained by the Tor Project and EFF. The tool automatically enables HTTPS for any site that offers it. "As more dating sites begin to provide support for HTTPS, we'll expand the ruleset for HTTPS Everywhere to include those sites so you'll be better protected."

There are no silver bullets when it comes to protecting company and customer data from loss or theft, but there are technological and procedural systems that will go a long way toward preventing a WikiLeaks-like data dump. Download our How To Prevent An Online Data Dump report. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Bprince
50%
50%
Bprince,
User Rank: Ninja
2/15/2012 | 3:11:41 AM
re: Looking For Love? Don't Trust Online Dating Sites
Good advice would also be for people to read the terms of service before uploading any information.
Brian Prince, InformationWeek/Dark Reading Comment Moderator
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, January 2015
To find and fix exploits aimed directly at your business, stop waiting for alerts and become a proactive hunter.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7402
Published: 2014-12-17
Multiple unspecified vulnerabilities in request.c in c-icap 0.2.x allow remote attackers to cause a denial of service (crash) via a crafted ICAP request.

CVE-2014-5437
Published: 2014-12-17
Multiple cross-site request forgery (CSRF) vulnerabilities in ARRIS Touchstone TG862G/CT Telephony Gateway with firmware 7.6.59S.CT and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) enable remote management via a request to remote_management.php,...

CVE-2014-5438
Published: 2014-12-17
Cross-site scripting (XSS) vulnerability in ARRIS Touchstone TG862G/CT Telephony Gateway with firmware 7.6.59S.CT and earlier allows remote authenticated users to inject arbitrary web script or HTML via the computer_name parameter to connected_devices_computers_edit.php.

CVE-2014-7170
Published: 2014-12-17
Race condition in Puppet Server 0.2.0 allows local users to obtain sensitive information by accessing it in between package installation or upgrade and the start of the service.

CVE-2014-7285
Published: 2014-12-17
The management console on the Symantec Web Gateway (SWG) appliance before 5.2.2 allows remote authenticated users to execute arbitrary OS commands by injecting command strings into unspecified PHP scripts.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.