Submitter : c2a
Date: 19 February 2014
Bounty : undisclosed
Vulnerabilities :
Programs :
Authors :
Link : https://blog.includesecurity.com/2014/02/how-i-was-able-to-track-the-location-of-any-tinder-user/
Submitter : c2a
Date: 19 February 2014
Bounty : undisclosed
Vulnerabilities :
Programs :
Authors :
Link : https://blog.includesecurity.com/2014/02/how-i-was-able-to-track-the-location-of-any-tinder-user/