Research Article
Exploiting Proximity-Based Mobile Apps for Large-Scale Location Privacy Probing
Table 3
Risk evaluation of proximity-based apps.
| APP | Possible exploit method | Risk of exploitation | Risk of data leakage |
| Badoo | Emulator simulation | Medium | Medium | LOVOO | Encryption cracking & forging requests, or emulator simulation | Medium | Medium | MeetMe | Forging requests | High | Medium | Mitalk | Encryption cracking & forging requests, or emulator simulation | Medium | High | Momo | Forging requests | High | High | Skout | Forging requests | High | Medium | Tinder | Forging requests | High | Medium | Wechat | Emulator simulation | Medium | Medium | Weibo | Forging requests | High | High | Didi | Forging requests | High | High | Uber | Emulator simulation | Medium | Medium |
|
|