So if you haven’t been notified by now that your man is on Tinder attempting to get his creep on with random locals or that your ex has moved on to oh, the rest of the New York City metro area after just 2 days of faking heartache- don’t fret. Swipe Buster, a service that was quietly released last week, allows users to input information regarding their boyfriend, ex, coworker or whoever they’re curious about to find out if they’re using Tinder.
All you need is the person’s name, age, and the last place they most likely used the location-based app and Swipe Buster will use Tinder’s API (application programming interface) to collect the data.
Swipe Buster users see Tinder profiles from the general location they specify that match the first name they input (because Tinder uses first names only). It’s then up to the snooper to go through the pictures to find (or, hopefully, not find) the person they’re looking for.
Users can then see the Tinder users’ pictures, when they were last online, and if they are looking for men or women. The information costs $5.
While exposing infidelity is something many people support, the company claims the goal is not necessarily to find cheaters or embarrass people.
In an email exchange with Mashable, the creator of Swipe Buster, who only refers to himself as Carlos, (how mysterious) says the goal of the application is to make people aware of how exposed their information is online.
“This is not a Tinder-specific issue,” he said. “People have way too much information about themselves available publicly. People should be aware of the privacy settings on all the services they use. Hopefully this conversation will remind a significant amount of people of that.”
Reverse-engineering Tinder’s API for a third-party app is not illegal in this case (and it’s not the first time it’s been done), but it’s nonetheless interesting that Swipe Buster’s creator has opted to charge for the service.
Swipe Buster comes less than a year after the major hack of Ashley Madison, the site that encourages extramarital affairs, which exposed personal information from the site’s (mostly male) users.