Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

Looking For Love? Don't Trust Online Dating Sites

When it comes to how dating websites secure and share information about their users, be sure to read the fine print, and don't be afraid to walk away.

Beware online dating websites, at least when it comes to their data privacy practices.

That warning comes by way of the Electronic Frontier Foundation (EFF), a non-profit group devoted to protecting digital rights. According to the organization, numerous dating sites--which are for-profit businesses, after all--sell data on their customers to third parties, including Google and Facebook. Furthermore, many online dating sites suffer from poor information security practices and may not delete profiles or images in a timely manner.

Online dating websites may also allow third-party search engines to index your profile. Notably, a public profile for Julian Assange, the editor in chief of WikiLeaks, was discovered in late 2010 on the free dating website OkCupid. While the site allows users to disable such indexing, even the privacy obsessed Assange apparently didn't realize that by default, all profiles are public.

[ Facebook and other social networking sites don't do enough to protect privacy, say users. See Social Media Survey: Privacy, Security Concerns Persist. ]

People might also be surprised to find that some online dating website profiles are being sold en masse to third parties. "Often, this transaction is gift-wrapped with the promise that your individual data is 'anonymized' or sold in aggregate form, yet users should be wary of such promises," said Rainey Reitman, EFF activism director, in a blog post. "Using data from social networking sites sold to advertisers, Stanford researcher Arvind Narayanan demonstrated that it's hard to truly anonymize data before it's packaged and sold."

The data being shared may also give people pause. Notably, Stanford computer science graduate student Jonathan Mayer last year released a study showing that OkCupid was selling or sharing user information with almost 30 third-party companies. That finding came from Mayer's review of the information-sharing practices of the top 250 websites listed on Quantcast.

All told, he found that 61% of the websites in his sample shared a username or user ID with a third-party website. Those third-party sites were ComScore (for 44% of the top 250 websites), Google Analytics (42%), Quantcast (34%), Google Advertising (34%), and Facebook (24%). In the case of OkCupid, shared information also included everything from age and religion to details about pets and frequency of drinking or smoking.

Leave it to a digital rights group to pour cold water on potential Valentine's Day romance? Perhaps, but by keeping an eye on online privacy practices for dating websites may offer people better long-term satisfaction.

One place to start is by reviewing a company's privacy policies to see what it promises. Also look at a company's information security history. One case in point is Grindr, a mobile app that's been embraced by the gay community. On Jan. 20, the company confirmed that there was a vulnerability in its software that could allow an attacker to access photos and messages and impersonate other users, and promised a fix "over the next few days." The company ultimately released a fix on February 10. But in the interim, security experts had recommended that the site's 3 million users temporarily delete their Grindr profiles.

Also check whether dating websites have implemented HTTPS to secure Web sessions, especially against local attackers who are sniffing packets, for example by using a tool such as Firesheep. "Our recent survey of major online dating sites found that most of them were not properly implementing HTTPS," said EFF's Reitman. "Some online dating sites offer partial support for HTTPS, and some offer none at all. This leaves user data exposed."

One Firefox plug-in that can help, she said, is HTTPS Everywhere, which is maintained by the Tor Project and EFF. The tool automatically enables HTTPS for any site that offers it. "As more dating sites begin to provide support for HTTPS, we'll expand the ruleset for HTTPS Everywhere to include those sites so you'll be better protected."

There are no silver bullets when it comes to protecting company and customer data from loss or theft, but there are technological and procedural systems that will go a long way toward preventing a WikiLeaks-like data dump. Download our How To Prevent An Online Data Dump report. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
GabrielC860
50%
50%
GabrielC860,
User Rank: Apprentice
8/9/2015 | 6:03:19 AM
re: Looking For Love? Don't Trust Online Dating Sites
hi there,it is very true all they are interest in is your money,and are full of scams the woman that you are into you are talking to a differnt woman all together, i know i was caught by the scam because i was new to the dating site at the time because you see the picture of the woman  that you would like to spend your life with,but you are not talking to her at all a compleatly differant woman ok all the best,gabriel.♥ 
Bprince
50%
50%
Bprince,
User Rank: Ninja
2/15/2012 | 3:11:41 AM
re: Looking For Love? Don't Trust Online Dating Sites
Good advice would also be for people to read the terms of service before uploading any information.
Brian Prince, InformationWeek/Dark Reading Comment Moderator
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/17/2020
Cybersecurity Bounces Back, but Talent Still Absent
Simone Petrella, Chief Executive Officer, CyberVista,  9/16/2020
Meet the Computer Scientist Who Helped Push for Paper Ballots
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/16/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5421
PUBLISHED: 2020-09-19
In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jsessionid path parameter.
CVE-2020-8225
PUBLISHED: 2020-09-18
A cleartext storage of sensitive information in Nextcloud Desktop Client 2.6.4 gave away information about used proxies and their authentication credentials.
CVE-2020-8237
PUBLISHED: 2020-09-18
Prototype pollution in json-bigint npm package < 1.0.0 may lead to a denial-of-service (DoS) attack.
CVE-2020-8245
PUBLISHED: 2020-09-18
Improper Input Validation on Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11....
CVE-2020-8246
PUBLISHED: 2020-09-18
Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11.2 before 11.2.1a, Citrix SD-W...