The tea app has increased the problems with data leaks since last week, since the breakup of the preliminary news, it has included two incidents of statistics exhibitions that have put thousands of users at risk online.
So what happened to the app that suddenly came to the number one position on the App Store and then suddenly entered the spotlight for problems and user issues?
We break everything needed to know about the notorious tea app below.
You can like
What is the tea app?
(Image Credit: Tea Dating Advice Inc./Tom Guide)
The tea app is just a women’s dating app that acts as a protective platform. Its users share anonymous reviews about men they have history or dating and talks about them. Launching membership users, users have to submit selfie and government -issued ID for verification.
The tea app recently became a top -free app for iOS users and has 2 million downloads. It also has a high ranking of the Google Play Store. According to reporting about the New York Times, it has gained considerable notoriety that people are demanding hacking on 4Chan.
What happened with the initial violation?
(Image Credit: Shutter Stock)
Although this incident is not technically ‘violation’, according to a different report from the BGR, a leakage occurred on Friday, July 25.
The tea app and the website were good. But an unsafe database of thousands of online records was leaked on different websites when an anonymous 4 Chian user indicated that the app uses an unsafe firebase storage bucket to keep IDs, selfies, images and images uploaded by users.
This user additionally shared an aggregate script that can be used to download data from the storage bucket that has been saved since. A total of 59GB of data was exposed, which included: 72,000 images contained 13,000 selfies and identification images that were submitted by users, as well as 59,000 photos of posts, comments and direct messages. Some of these photos can also be obtained from location data.
Tea confirmed in a public statement that this initial leak impressed users who had signed up before February 2024, calling it a “Legacy Storage System”, and confirmed that no email addresses or phone numbers were revealed.
The company behind the app then explained that selfies could not be deleted because they were safe to comply with law enforcement requirements for cyber bullying. However, this figure has been leaked – which is now shared in various forums of hacking – not only exposes the app members not only in various phishing and social engineering attacks but also poles and humiliation.
What happened in this latest violation?
(Image Credit: Shutter Stock)
This secondary violation includes an additional database of 1.1 million private messages sent among users on the platform and includes recent data – from 2023 to last week – as well as messages on sensitive topics.
According to 404 media reporting, it will be possible for users to identify their social media profiles, phone numbers or other personal information that have been revealed in these messages.
What’s going on now?
(Image Credit: Shutter Stock)
Tea says it continues to work with law enforcement agencies to assist in the investigation, and in a statement to blend the computer, the company said that some direct messages (DMS) were accessed as part of the first incident. Similarly, tea confirmed that it has now taken the affected messaging system offline, though they have not found any additional evidence of access to any other parts of its system.
Tea added that they are working to identify users whose personal information was included and they will offer free access to the best identity protection services to the affected people. Tea has also encouraged users who have questions to reach them through support@TeaForwomen.com for more information. Tea users should also consider replacing their identity, freezing their credit, and carefully monitoring all their online accounts.
In addition, consumers should be aware of the symptoms of phishing or social engineering attacks and be careful of any unexpected links or attachments in emails or texts, especially from unknown seals. Be careful to anyone who tries to contact you through social media, and anyone who asks personal information.
Process Tom’s leader on Google News Our latest news in our feeds, how, and get reviews. Make sure to click the follow button.
More from Tom Guide
Today’s identity deals related to theft protection


