"That Person Was Actually Fake"
Story of Personal Information Leaked Through Fake and Counterfeit Dating Apps

"At first, I had absolutely no suspicions. The profile looked natural, and the chat flowed smoothly."
This is the story of "A," an ordinary dating app user. The dating app, downloaded from the app store, had a familiar UI and seemed functional.
Uploading photos, creating a profile, and even exchanging messages with a partner felt like a "real app."
But a few days later, strange things started happening. I received notifications for signing up to an unused overseas website, mysterious messages, and private conversations that seemed to be shared with someone.
The problem was simple: the app wasn't a "real dating app."
The Real Problem – Typical Fake App Techniques
The attacker copied a legitimate dating app and distributed a repackaged fake app. Actual Attack Method
• Repackaging of legitimate dating app APK
• Exact replication of login, profile, and chat UI
• Transmission of user-entered information (photos, conversations, and location) to an external server
From the user's perspective, they "just installed and used the app," but in reality, the following information was being passed on to the attacker:
• Profile photo
• Chat conversation contents
• Location information
• Login account information
Due to the nature of dating apps, this information is not just personal information; it's a matter of privacy itself.
Where did the security breach occur?
The core of this incident is surprisingly simple.
• The app's authenticity was not verified.
• The screen UI could not be verified as authentic or altered.
• The user had no way to determine whether the app was fake or not.
In other words, it was a classic mobile security incident: "The moment you trust an app, your security is gone."
No matter how strong the server security, the moment a user runs a fake app, all protections are nullified.
How did LIAPP and LIKEY protect against this?
This type of attack can only be prevented by simultaneously protecting both the app itself and the input section.
LIAPP – Counterfeit App (Repackaged App) Detection
LIAPP checks, "Is this app genuine?" from the moment the app is launched.
• App signature, code, and resource integrity checks
• Immediately identifies apps different from officially distributed apps
• Blocks execution of repackaged and modified apps
• Disabling fake login and chat UIs
Blocks the fake app itself from running
LIKEY – Protects Personal Information Input Sections
Even if an attacker targets input information, LIKEY protects the input section itself.
• Implements a secure keypad for login and profile input
• Blocks input theft based on keyloggers and screen captures
• Protects user input data
Keeps photo, account, and profile input sections secure
What's changed since then?
The changes after applying security were clear. • Immediately blocking attempts to access fake apps
• Stopping personal information leaks
• Reducing user churn
• Restoring trust that "this app is safe"
This case once again confirmed that the most important asset in dating apps is not functionality, but trust.
Final Lesson
In dating apps, personal information isn't just data.
• Photos are faces,
• Chats are private, and
• Location is directly related to real-world security.
If an app isn't authenticated, no personal information is safe.
Blocking fake apps isn't an option, it's a prerequisite.
And that prerequisite becomes reality only when LIAPP and LIKEY accurately fulfill their respective roles.
#DatingAppSecurity#FakeAppRisk#FakeAppDetection#PersonalInformationLeakCases#MobileSecurity#AppForgeryDefense#DatingAppRiskFactors#PersonalInformationProtection#MobileAppSecurity#SecurityCaseAnalysis#UserTrust#AppSecurityImportant#SecurityIsAPrerequisite#LIAPP#LISS#LIKEY