The studies discuss artifact collection (from files on the device as well as from network traffic), triangulation of user locations, discovery of social relationships, and other privacy concerns. In these related works, some focus on dating apps (one also covers Happn) and others taking a broader approach. Next, we will revisit the extant literature relating to mobile forensics. Complications encountered during the study are discussed in Section 5. These artifacts are separated into ten different categories, whose data sources include captured network traffic, disk images from the devices, and iTunes backup data. This section covers various artifacts recovered from network traffic and files left on the devices from the app. The findings are then reported in Section 4. The images and backups are then analyzed to reveal further artifacts. For example, devices are imaged if possible, and iTunes backups are utilized instead for the iOS devices that could not be jailbroken. To ensure repeatability and reproducibility, we describe our research methodology, which includes the creation of profiles, capturing of network traffic, acquisition of device images, and backing up of iOS devices with iTunes (see Section 3). In this paper, we highlight the potential for malicious actors to uncover the personal information of other users through a forensic analysis of the app’s activity on both Android and iOS devices, using both commercial forensic tools and freely available tools. This is the gap we seek to address in this paper. Given the popularity of dating apps and the sensitive nature of such apps, it is surprising that forensic studies of dating apps is relatively understudied in the broader mobile forensic literature ( Agrawal et al., 2018, Barmpatsalou et al., 2018) (see also Section 2). Such increased usage could have security and safety implications ( Lauckner et al., 2019 Schreurs et al., 2020). In addition, it was recently reported that activities on popular dating apps appeared to have increased in the recent COVID-19 lockdowns, as more users are staying and working from home 2 While this is a convenient way of connecting strangers ( Sumter and Vandenbosch, 2019, Veel, Thylstrup, 2018), it could make Happn users more vulnerable to predatory behavior, such as stalking ( Lee, 2018, Murphy, 2018, Scannell, 2019, Tomaszewska, Schuster, 2019). From there, the user can view brief descriptions, pictures or other information uploaded by the user. Popular apps such as Tinder allow users to restrict the range to a specified radius, but Happn takes this approach a step further by tracking users who have crossed paths. For example, geolocation-based dating apps allow users to find dates within a certain geographic area ( Attrill-Smith and Chris, 2019, Sumter and Vandenbosch, 2019, Yadegarfard, 2019), and a number of dating apps have reportedly “rolled out functionality and pricing changes to help people connect more deeply without meeting in person” in the recent lockdowns due to COVID-19 1 Depending on the type of app, some will focus more heavily on certain functions over another. Encompassing both iOS and Android devices along with eight varying user profiles with diverse backgrounds, this study aims to explore the potential for a malicious actor to uncover the personal information of another user by identifying artifacts that may pertain to sensitive user data.ĭating application (apps) have a variety of functions for users to match and meet others, for example based on their interest, profile, background, location, and/or other factors using functions such as location tracking, social media integration, user profiles, chatting, and so forth. This paper examines the Happn dating app (versions 9.6.2, 9.7, and 9.8 for iOS devices, and versions 3.0.22 and 24.18.0 for Android devices), which geographically works differently compared to most notable dating apps by providing users with profiles of other users that might have passed by them or in the general radius of their location. For example, while apps with geolocation feature are intended for users to provide personal information that drive their search to meet someone, that same information can be used by hackers or forensic analysts to gain access to personal data, albeit for different purposes. However, with each new app comes the possibility of criminal exploitation. To connect the users, geolocation is often utilized. With today’s world revolving around online interaction, dating applications (apps) are a prime example of how people are able to discover and converse with others that may share similar interests or lifestyles, including during the recent COVID-19 lockdowns.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |