Sexy cam chatbot
"Poke." "Hey buddy." "Hey sexy." Say hello back and they’ll respond with a quick story about how incredibly frisky they are feeling.It seems that they have just gotten home from the gym, and are about to remove all their clothing. In this case, what might seem too good to be true actually is.
Users could be forgiven for assuming spambots wouldn’t be an issue in Grindr.Spambots are not unique to Grindr; the world of dating apps is filled with scam artists.They also figured out a way to circumvent Grindr’s blocking technology, hounding users with an additional invitation to join the webcam chat even after the user blocked the bot.(A bug fix in April appears to have ended that particular problem, at least for now.) Tim Strazzere, lead research and response engineer at Lookout Mobile Security, speculates that spammers are able to spoof their location by opening Grindr in an Android emulator and searching for users in target-rich environments like New York and San Francisco.
By not requiring email addresses or passwords, Grindr makes it easy for spammers to open up unlimited instances of Grindr on their computers and not worry their activity will be traced back to them."It wouldn’t be too complicated to try to reverse-engineer the APIs they’re using and set up an app where you log into a server and say, ‘Show me everyone who’s in San Francisco,’" Strazzere said.