What’s actually ‘Happning’? A forensic assessment of iOS & Android Happn internet dating software

What’s actually ‘Happning’? A forensic assessment of iOS & Android Happn internet dating software

Enhance Mendeley


Forensic comparison of iOS & Android Happn online dating software.

iTunes backup artifacts from Happn mobile software forensics.

Real picture and system site visitors items from Happn forensics.


With today’s world revolving around using the internet connections, matchmaking programs (software) tend to be a prime example of just how everyone is capable introducing and speak to people that’ll express comparable interests or life-style, such as during the present COVID-19 lockdowns. To get in touch the people, geolocation is commonly applied. But with each newer software happens the possibility of criminal exploitation. Like, while software with geolocation ability include meant for customers to present personal information that push their particular research meet up with somebody, that same information can be utilized by code hackers or forensic experts to achieve entry to personal facts, albeit a variety of needs. This report examines the Happn internet dating app (versions 9.6.2, 9.7, and 9.8 for iOS systems, and variations 3.0.22 and 24.18.0 for Android tools), which geographically operates in different ways in comparison to perhaps most obviously matchmaking apps by providing users with profiles of other consumers that may has passed away by all of them or even in the typical distance regarding location. Encompassing both apple’s ios and Android devices along with eight varying user profiles with diverse experiences, this research aims to explore the potential for a malicious star to locate the personal ideas of another consumer by pinpointing items https://www.hookupdate.net/pl/aplikacje-randkowe/ which will pertain to delicate user information.

Graphical abstract

Past article in concern
Further post in problem


Shawn Knox obtained their Bachelor’s of company management in Cyber protection from UTSA in 2019. In the same 12 months, he’s got started following a Master’s of technology in it with a concentration in Cyber Security. His goals should be develop their comprehension of the cyber security field and implement that knowledge as a security analyst for your large businesses.

Steven Moghadam got their Bachelor’s of companies government in Information programs and Cyber safety from UTSA in autumn 2019 possesses since already been pursuing a Master’s of Science in Information Technology with a quantity in Cyber Security. He’s become awarded the Department of protection (DoD) Cyber grant plan (CySP) as an element of his Graduate degree, that enables your to further his research through the master’s cyber regimen. Their career purpose comprises of being employed as a Cyber Security professional for any United States federal government.

Kenny Patrick gotten their Bachelor’s of Business Administration in Cyber protection from UTSA in December 2018. The guy began following a Master’s of Science in i . t at UTSA in January 2019 with an expected graduation in May 2020. His welfare include electronic forensics, event responses, program development, and automation.

Anh Kim Phan gotten this lady Bachelor’s of Business government in Cyber Security from UTSA in 2018 and contains as become seeking a Master’s of Science in i . t with an attention in Cyber protection. She’s become given the Kudla Endowed Fellowship in info Assurance and protection as an element of the woman Graduate amount, which allows the woman to focus as an investigation associate on several studies in the area of Cyber protection. The lady profession goals is constructed of working as a Digital Forensic specialist your United States authorities.

Kim-Kwang Raymond Choo retains the affect tech Endowed Professorship at UTSA. In 2016, he was named the Cybersecurity teacher of the Year – APAC, along with 2015 the guy with his teams claimed the Digital Forensics investigation Challenge organized by Germany’s University of Erlangen-Nuremberg. He could be the person for the 2019 IEEE TC on Scalable Computing’s honor for superiority in Scalable Computing (Middle profession specialist), 2018 UTSA college or university of businesses Endowed investigation Award for Tenured Faculty, 2018 IEEE Access great Associate publisher, British Computer community’s 2019 Wilkes Award Runner-up, 2019 EURASIP JWCN Best report honor, Korea Ideas Processing culture’s JIPS Survey Paper prize (silver) 2019, IEEE Blockchain 2019 exceptional papers Award, IEEE TrustCom 2018 most readily useful report honor, ESORICS 2015 Best study report Award, 2014 very Commended honor by Australia brand-new Zealand Policing Advisory company, Fulbright Scholarship in ’09, 2008 Australia time Achievement Medallion, and British computer system people’s 2018 Wilkes Award.

Leave a Reply

Your email address will not be published. Required fields are marked *