Research Article

Exploiting Proximity-Based Mobile Apps for Large-Scale Location Privacy Probing

Table 3

Risk evaluation of proximity-based apps.

APPPossible exploit methodRisk of exploitationRisk of data leakage

BadooEmulator simulation MediumMedium
LOVOOEncryption cracking & forging requests, or emulator simulation MediumMedium
MeetMeForging requestsHighMedium
MitalkEncryption cracking & forging requests, or emulator simulationMediumHigh
MomoForging requestsHighHigh
SkoutForging requestsHighMedium
TinderForging requestsHighMedium
WechatEmulator simulationMediumMedium
WeiboForging requestsHighHigh
DidiForging requestsHighHigh
UberEmulator simulationMediumMedium