Topics

late

AI

Amazon

Article image

Image Credits:Raw

Apps

Biotech & Health

clime

one of the as-yet-unreleased Raw wearable hardware rings.

Image Credits:Raw

Cloud Computing

Commerce

Crypto

initiative

EVs

Fintech

Fundraising

widget

Gaming

Google

Government & Policy

Hardware

Instagram

Layoffs

Media & Entertainment

Meta

Microsoft

Privacy

Robotics

Security

Social

quad

Startups

TikTok

Transportation

speculation

More from TechCrunch

issue

Startup Battlefield

StrictlyVC

newssheet

Podcasts

TV

Partner Content

TechCrunch Brand Studio

Crunchboard

Contact Us

A security oversight at see app Raw publicly expose the personal data point and private localisation data of its users , TechCrunch has notice .

The exposed data included users ’ showing names , dates of birth , date stamp and sexual preferences assort with the Raw app , as well as users ’ locations . Some of the positioning data included co-ordinate that were specific enough to locate Raw app users with street - level accuracy .

Raw , which launched in 2023 , isa dating appthat claims to offer more genuine interactions with others in part by asking users to upload daily selfie photos . The company does not disclose how many user it has , but its app list on the Google Play Store mention more than 500,000 Android downloads to date .

word of the protection relapse fare in the same week that the startup announced a ironware extension of its date stamp app , the Raw Ring , anunreleased wearable devicethat it claims will allow app users to track their partner ’s heart pace and other sensor datum to obtain AI - engender insights , ostensibly to observe infidelity .

Notwithstanding themoral and ethical issues of tracking romantic partnersandthe risks of emotional surveillance , Raw claim on its web site and in its concealment insurance that its app , and its unreleased machine , both useend - to - end encryption , a security feature that prevents anyone other than the substance abuser — including the ship’s company — from accessing the data .

When we hear the app this workweek , which included an depth psychology of the app ’s internet traffic , TechCrunch retrieve no evidence that the app employ death - to - end encryption . Instead , we obtain that the app was in public spilling data about its users to anyone with a web internet browser .

Raw secure the data exposure on Wednesday , concisely after TechCrunch contacted the company with details of the bug .

“ All previously bring out endpoint have been secured , and we ’ve implemented additional safe-conduct to foreclose similar issue in the future , ” Marina Anderson , the carbon monoxide gas - founder of stark naked dating app , assure TechCrunch by e-mail .

When involve by TechCrunch , Anderson confirmed that the company had not performed a third - company security audit of its app , tally that its “ centering remains on build a eminent - tone product and engaging meaningfully with our grow community of interests . ”

Anderson would not give to proactively notifying affected users that their selective information was exposed , but said the company would “ submit a detailed study to the relevant data protective cover authorities under applicable regularization . ”

It ’s not immediately have sex how long the app was publicly splatter its users ’ data . Anderson said that the company was still investigating the incident .

Regarding its title that the app uses close - to - end encryption , Anderson said Raw “ uses encryption in transit and enforces access controls for raw data within our infrastructure . Further steps will be clear after thoroughly psychoanalyze the berth . ”

Anderson would not say , when expect , whether the company contrive to line up its privacy insurance policy , and Anderson did not respond to a succeed - up e-mail from TechCrunch .

How we found the exposed data

TechCrunch discovered the bug on Wednesday during a abbreviated exam of the app . As part of our test , we instal the Raw dating app on a virtualized Android machine , which set aside us to use the app without having to leave any real - world data , such as our strong-arm location .

We created a new substance abuser account with dummy data , such as a name and date of nascency , and configure our virtual gimmick ’s location to appear as though we were at a museum in Mountain View , California . When the app call for our virtual equipment ’s emplacement , we reserve the app access to our accurate positioning down to a few metre .

We used a meshwork traffic analysis putz to supervise and visit the information flowing in and out of the unsanded app , which allowed us to understand how the app work and what kinds of data the app was upload about its users .

TechCrunch reveal the information photo within a few arcminute of using the unsanded app . When we first loaded the app , we found that it was pull out the user ’s profile entropy straight from the fellowship ’s servers , but that the host was not protecting the return data with any authentication .

In praxis , that meant anyone could access any other substance abuser ’s private information by using a web web browser to visit the web address of the exposed waiter — api.raw.app/users/followed by a unique 11 - finger number agree to another app user . Changing the digits to correspond with any other user ’s 11 - finger’s breadth identifier returned private information from that exploiter ’s visibility , include their fix data point .

This kind of exposure is known as an unsafe lineal object reference , or IDOR , a type of bug that can permit someone to get at or modify data on someone else ’s host because of a lack of proper security check on the user accessing the data .

Aswe’ve explained before , IDOR bugs are cognate to having a winder to a private postbox , for example , but that key can also unlock every other letter box on that same street . As such , IDOR bugs can be exploited with ease and in some case itemise , allow access to record book after record of user data .

U.S. cybersecurity agency CISA has long warn of the endangerment that IDOR bugs present , including the power to get at typically sensitive data “ at scale . ” As part of itsSecure by Designinitiative , CISA saidin a 2023 advisorythat developer should assure their apps perform proper authentication and authorization assay .

Since Raw fixed the bug , the expose server no longer returns user data in the browser app .