This week, Tinder responded to a letter from Oregon Senator Ron Wyden calling for the company to close up security loopholes in its app that could lead to coercion and other privacy incursions.

In a letter to Sen. Wyden, Match Group General Counsel Jared Sine describes recent changes to the app , noting that as of June 19, “swipe data has been padded such that all actions are now the same size.” Sine added that images on the mobile app are fully encrypted as of February 6, while personas on the web explanation of Tinder were already encrypted.

The Tinder controversies were first called out in a report by studies and research crew at Checkmarx describing the app’s “disturbing vulnerabilities” and their propensity for coerce 😛 TAGEND

The vulnerabilities, found in both the app’s Android and iOS copies, permit an attacker using the same system as the subscribers to monitor the user’s every move on the app. It is also possible for an attacker to take control over the specific characteristics paints the user receives, swapping them for inappropriate material, rogue promote or other type of malicious content( as demonstrated in the research ).

While no credential steal and no immediate monetary jolt are involved in this process, an attacker targeting a vulnerable user can blackmail the main victims, threatening to expose highly private information from the user’s Tinder profile and actions in the app.

In February, Wyden called for Tinder to address the vulnerability by encrypting all data that moves between its servers and the app and by padding data to fog it from hackers. In a statement to TechCrunch at the time, Tinder indicated that it heard Sen. Wyden’s concerns and has only applied encryption for chart photos in the interest of to work towards redoubling its privacy practices.

“Like every engineering companionship, we are constantly strive to improve our securities in the battle against malevolent intruders and cyber delinquents, ” Sine said in the letter. “ … Our destination is to have etiquettes and organizations that is not simply assemble, but transcend industry best practices.”

Read more: feedproxy.google.com