What’s really ‘Happning’? A forensic analysis of Android and iOS Happn dating apps

What’s really ‘Happning’? A forensic analysis of Android and iOS Happn dating apps

Keywords

Shawn Knox received his Bachelor’s of Business Administration in Cyber Security from UTSA in 2019. In the same year, he has begun pursuing a Master’s of Science in Information Technology with a concentration in Cyber Security. His goals are to expand his knowledge of the cyber security field and apply that knowledge as a security analyst for the big businesses.

Steven Moghadam received his Bachelor’s of Business Administration in both Information Systems and Cyber Security from UTSA in Fall 2019 and has since been pursuing a Master’s of Science in Information Technology with a concentration in Cyber Security. He has been awarded the Department of Defense (DoD) Cyber Scholarship Program (CySP) as part of his Graduate degree, which allows him to further his studies through the master’s escort services in Frisco cyber program. His career goal consists of working as a Cyber Security Specialist for the US Government.

Abstract

With today’s world revolving around online interaction, dating applications (apps) are a prime example of how people are able to discover and converse with others that may share similar interests or lifestyles, including during the recent COVID-19 lockdowns. To connect the users, geolocation is often utilized. However, with each new app comes the possibility of criminal exploitation. For example, while apps with geolocation feature are intended for users to provide personal information that drive their search to meet someone, that same information can be used by hackers or forensic analysts to gain access to personal data, albeit for different purposes. This paper examines the Happn dating app (versions 9.6.2, 9.7, and 9.8 for iOS devices, and versions 3.0.22 and .0 for Android devices), which geographically works differently compared to most notable dating apps by providing users with profiles of other users that might have passed by them or in the general radius of their location. Encompassing both iOS and Android devices along with eight varying user profiles with diverse backgrounds, this study aims to explore the potential for a malicious actor to uncover the personal information of another user by identifying artifacts that may pertain to sensitive user data.

Graphical abstract

Continue Reading →