{"id":165916,"date":"2025-05-02T17:56:04","date_gmt":"2025-05-02T17:56:04","guid":{"rendered":"https:\/\/entertainment.runfyers.com\/index.php\/2025\/05\/02\/exclusive-dating-app-raw-exposed-users-location-data-and-personal-information\/"},"modified":"2025-05-02T17:56:04","modified_gmt":"2025-05-02T17:56:04","slug":"exclusive-dating-app-raw-exposed-users-location-data-and-personal-information","status":"publish","type":"post","link":"https:\/\/entertainment.runfyers.com\/index.php\/2025\/05\/02\/exclusive-dating-app-raw-exposed-users-location-data-and-personal-information\/","title":{"rendered":"Exclusive: Dating app Raw exposed users&#8217; location data and personal information"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p id=\"speakable-summary\" class=\"wp-block-paragraph\">A security lapse at dating app Raw publicly exposed the personal data and private location data of its users, TechCrunch has found.<\/p>\n<p class=\"wp-block-paragraph\">The exposed data included users\u2019 display names, dates of birth, dating and sexual preferences associated with the Raw app, as well as users\u2019 locations. Some of the location data included coordinates that were specific enough to locate Raw app users with street-level accuracy.<\/p>\n<p class=\"wp-block-paragraph\">Raw, which launched in 2023, is <a href=\"https:\/\/techcrunch.com\/2024\/05\/31\/sample-angel-pitch-deck-raw-dating-app\/\" target=\"_blank\" rel=\"noreferrer noopener\">a dating app<\/a> that claims to offer more genuine interactions with others in part by asking users to upload daily selfie photos. The company does not disclose how many users it has, but its app listing on the Google Play Store notes more than 500,000 Android downloads to date.<\/p>\n<p class=\"wp-block-paragraph\">News of the security lapse comes in the same week that the startup announced a hardware extension of its dating app, the Raw Ring, an <a href=\"https:\/\/www.fastcompany.com\/91295715\/a-new-wearable-from-dating-app-raw-promises-to-track-your-partners-emotions-in-real-time\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">unreleased wearable device<\/a> that it claims will allow app users to track their partner\u2019s heart rate and other sensor data to receive AI-generated insights, ostensibly to detect infidelity.<\/p>\n<p class=\"wp-block-paragraph\">Notwithstanding the <a href=\"https:\/\/techcrunch.com\/2025\/03\/19\/hacked-leaked-exposed-why-you-should-stop-using-stalkerware-apps\/\" target=\"_blank\" rel=\"noreferrer noopener\">moral and ethical issues of tracking romantic partners<\/a> and <a href=\"https:\/\/www.theverge.com\/wearables\/657475\/raw-ring-wearables-emotion-tracking-smart-ring\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">the risks of emotional surveillance<\/a>, Raw claims on its website and in its privacy policy that its app, and its unreleased device, both use <a href=\"https:\/\/techcrunch.com\/2025\/04\/25\/techcrunch-reference-guide-to-security-terminology\/#end-to-end-encryption\" target=\"_blank\" rel=\"noreferrer noopener\">end-to-end encryption<\/a>, a security feature that prevents anyone other than the user \u2014 including the company \u2014 from accessing the data.<\/p>\n<p class=\"wp-block-paragraph\">When we tried the app this week, which included an analysis of the app\u2019s network traffic, TechCrunch found no evidence that the app uses end-to-end encryption. Instead, we found that the app was publicly spilling data about its users to anyone with a web browser.<\/p>\n<p class=\"wp-block-paragraph\">Raw fixed the data exposure on Wednesday, shortly after TechCrunch contacted the company with details of the bug.<\/p>\n<p class=\"wp-block-paragraph\">\u201cAll previously exposed endpoints have been secured, and we\u2019ve implemented additional safeguards to prevent similar issues in the future,\u201d Marina Anderson, the co-founder of Raw dating app, told TechCrunch by email.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">When asked by TechCrunch, Anderson confirmed that the company had not performed a third-party security audit of its app, adding that its \u201cfocus remains on building a high-quality product and engaging meaningfully with our growing community.\u201d<\/p>\n<p class=\"wp-block-paragraph\">Anderson would not commit to proactively notifying affected users that their information was exposed, but said the company would \u201csubmit a detailed report to the relevant data protection authorities under applicable regulations.\u201d<\/p>\n<p class=\"wp-block-paragraph\">It\u2019s not immediately known how long the app was publicly spilling its users\u2019 data. Anderson said that the company was still investigating the incident.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">Regarding its claim that the app uses end-to-end encryption, Anderson said Raw \u201cuses encryption in transit and enforces access controls for sensitive data within our infrastructure. Further steps will be clear after thoroughly analyzing the situation.\u201d\u00a0<\/p>\n<p class=\"wp-block-paragraph\">Anderson would not say, when asked, whether the company plans to adjust its privacy policy, and Anderson did not respond to a follow-up email from TechCrunch.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-how-we-found-the-exposed-data\"><strong>How we found the exposed data<\/strong><\/h2>\n<p class=\"wp-block-paragraph\">TechCrunch discovered the bug on Wednesday during a brief test of the app. As part of our test, we installed the Raw dating app on a virtualized Android device, which allows us to use the app without having to provide any real-world data, such as our physical location.<\/p>\n<p class=\"wp-block-paragraph\">We created a new user account with dummy data, such as a name and date of birth, and configured our virtual device\u2019s location to appear as though we were at a museum in Mountain View, California. When the app requested our virtual device\u2019s location, we allowed the app access to our precise location down to a few meters.<\/p>\n<p class=\"wp-block-paragraph\">We used a network traffic analysis tool to monitor and inspect the data flowing in and out of the Raw app, which allowed us to understand how the app works and what kinds of data the app was uploading about its users.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">TechCrunch discovered the data exposure within a few minutes of using the Raw app. When we first loaded the app, we found that it was pulling the user\u2019s profile information directly from the company\u2019s servers, but that the server was not protecting the returned data with any authentication.<\/p>\n<p class=\"wp-block-paragraph\">In practice, that meant anyone could access any other user\u2019s private information by using a web browser to visit the web address of the exposed server \u2014 <code>api.raw.app\/users\/<\/code> followed by a unique 11-digit number corresponding to another app user. Changing the digits to correspond with any other user\u2019s 11-digit identifier returned private information from that user\u2019s profile, including their location data.<\/p>\n<div class=\"wp-block-group alignwide is-nowrap is-layout-flex wp-container-core-group-is-layout-4 wp-block-group-is-layout-flex\">\n<figure class=\"wp-block-image size-full\"><figcaption class=\"wp-element-caption\"><span class=\"wp-block-image__credits\"><strong>Image Credits:<\/strong>TechCrunch<\/span><\/figcaption><\/figure>\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"991\" height=\"703\" src=\"https:\/\/techcrunch.com\/wp-content\/uploads\/2025\/05\/raw-app-exposed-data-location.png\" alt=\"a screenshot showing the location of the TechCrunch user's profile on a map, hovering over Mountain View, California.\" class=\"wp-image-3002383\" style=\"box-shadow:var(--wp--preset--shadow--natural)\" srcset=\"https:\/\/techcrunch.com\/wp-content\/uploads\/2025\/05\/raw-app-exposed-data-location.png 991w, https:\/\/techcrunch.com\/wp-content\/uploads\/2025\/05\/raw-app-exposed-data-location.png?resize=150,106 150w, https:\/\/techcrunch.com\/wp-content\/uploads\/2025\/05\/raw-app-exposed-data-location.png?resize=300,213 300w, https:\/\/techcrunch.com\/wp-content\/uploads\/2025\/05\/raw-app-exposed-data-location.png?resize=768,545 768w, https:\/\/techcrunch.com\/wp-content\/uploads\/2025\/05\/raw-app-exposed-data-location.png?resize=680,482 680w, https:\/\/techcrunch.com\/wp-content\/uploads\/2025\/05\/raw-app-exposed-data-location.png?resize=430,305 430w, https:\/\/techcrunch.com\/wp-content\/uploads\/2025\/05\/raw-app-exposed-data-location.png?resize=720,511 720w, https:\/\/techcrunch.com\/wp-content\/uploads\/2025\/05\/raw-app-exposed-data-location.png?resize=900,638 900w, https:\/\/techcrunch.com\/wp-content\/uploads\/2025\/05\/raw-app-exposed-data-location.png?resize=800,568 800w, https:\/\/techcrunch.com\/wp-content\/uploads\/2025\/05\/raw-app-exposed-data-location.png?resize=668,474 668w, https:\/\/techcrunch.com\/wp-content\/uploads\/2025\/05\/raw-app-exposed-data-location.png?resize=529,375 529w, https:\/\/techcrunch.com\/wp-content\/uploads\/2025\/05\/raw-app-exposed-data-location.png?resize=870,617 870w, https:\/\/techcrunch.com\/wp-content\/uploads\/2025\/05\/raw-app-exposed-data-location.png?resize=708,502 708w\" sizes=\"auto, (max-width: 991px) 100vw, 991px\"\/><figcaption class=\"wp-element-caption\"><span class=\"wp-block-image__credits\"><strong>Image Credits:<\/strong>TechCrunch<\/span><\/figcaption><\/figure>\n<\/div>\n<p class=\"wp-block-paragraph\">This kind of vulnerability is known as an insecure direct object reference, or IDOR, a type of bug that can allow someone to access or modify data on someone else\u2019s server because of a lack of proper security checks on the user accessing the data.<\/p>\n<p class=\"wp-block-paragraph\">As <a href=\"https:\/\/techcrunch.com\/2023\/07\/27\/cisa-nsa-australia-idor-flaws\/\" target=\"_blank\" rel=\"noreferrer noopener\">we\u2019ve explained before<\/a>, IDOR bugs are akin to having a key to a private mailbox, for example, but that key can also unlock every other mailbox on that same street. As such, IDOR bugs can be exploited with ease and in some cases enumerated, allowing access to record after record of user data.<\/p>\n<p class=\"wp-block-paragraph\">U.S. cybersecurity agency CISA has long warned of the risks that IDOR bugs present, including the ability to access typically sensitive data \u201cat scale.\u201d As part of its <a href=\"https:\/\/www.cisa.gov\/securebydesign\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Secure by Design<\/a> initiative, CISA said <a href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa23-208a\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">in a 2023 advisory<\/a> that developers should ensure their apps perform proper authentication and authorization checks.<\/p>\n<p class=\"wp-block-paragraph\">Since Raw fixed the bug, the exposed server no longer returns user data in the browser.\u00a0<\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/techcrunch.com\/2025\/05\/02\/dating-app-raw-exposed-users-location-data-personal-information\/\" target=\"_blank\" rel=\"noopener\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A security lapse at dating app Raw publicly exposed the personal data and private location data of its users, TechCrunch has found. The exposed data included users\u2019 display names, dates of birth, dating and sexual preferences associated with the Raw app, as well as users\u2019 locations. Some of the location data included coordinates that were [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":165917,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14],"tags":[],"class_list":{"0":"post-165916","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tech"},"_links":{"self":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts\/165916","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/comments?post=165916"}],"version-history":[{"count":0,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts\/165916\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/media\/165917"}],"wp:attachment":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/media?parent=165916"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/categories?post=165916"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/tags?post=165916"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}