{"id":225,"date":"2026-05-01T05:07:51","date_gmt":"2026-05-01T05:07:51","guid":{"rendered":"https:\/\/blog.osto.one\/?p=225"},"modified":"2026-05-06T16:28:11","modified_gmt":"2026-05-06T16:28:11","slug":"womens-safety-app-exposes-private-messages-data-breach","status":"publish","type":"post","link":"https:\/\/www.osto.one\/resources\/incidents\/womens-safety-app-exposes-private-messages-data-breach\/","title":{"rendered":"The App Built to Keep Women Safe Just Exposed 1.1 Million of Their Private Messages"},"content":{"rendered":"<p><!-- SEO: Tea app data breach Firebase misconfiguration | women's safety app breach 2025 | legacy database exposure --><\/p>\n<p style=\"font-size:17px;line-height:1.75;color:#333;\">Tea is a women-only dating safety app with 1.6 million users in the United States. Its entire value proposition is trust. Women use it to run background checks on potential dates, anonymously flag bad actors, and share safety information with each other. The tagline is &#8220;the safest place to spill tea.&#8221;<\/p>\n<p style=\"font-size:17px;line-height:1.75;color:#333;\">When Tea onboards users, it asks them to upload a selfie and a government-issued photo ID to verify their identity. In return, it promises to delete that verification data immediately after authentication is complete.<\/p>\n<p><!-- OPENING HIT --><\/p>\n<div style=\"background:#FFF8F8;border-left:5px solid #D94040;padding:20px 24px;margin:28px 0;border-radius:2px;\">\n<p style=\"font-size:17px;font-weight:600;color:#D94040;margin:0;line-height:1.65;\">On July 25, 2025, hackers accessed a legacy database Tea had never deleted. Inside: 13,000 selfies with government IDs, 59,000 additional user images, and 1.1 million private messages from women discussing divorce, abortion, infidelity, and sexual assault. The data was posted publicly. Within hours, users&#8217; faces were being rated on 4chan.<\/p>\n<\/div>\n<h2 style=\"font-size:22px;font-weight:600;color:#111;margin:40px 0 14px;padding-bottom:10px;border-bottom:2px solid #EEF1FB;\">There were actually two breaches, not one<\/h2>\n<p style=\"font-size:17px;line-height:1.75;color:#333;\">Tea&#8217;s public disclosure framed the incident as a single event affecting a legacy database. The reality was more complicated. Security researcher Kasra Rahjerdi investigated further and found a second, entirely separate exposure.<\/p>\n<p><!-- TWO BREACHES --><\/p>\n<div style=\"margin:20px 0 32px;display:flex;flex-direction:column;gap:8px;\">\n<div style=\"border:1px solid #EEF1FB;padding:20px 22px;border-radius:2px;\">\n<div style=\"font-size:11px;font-weight:700;letter-spacing:0.15em;text-transform:uppercase;color:#D94040;margin-bottom:10px;\">Breach 1 \u2014 The legacy database<\/div>\n<p style=\"font-size:15px;color:#333;margin:0;line-height:1.65;\">A legacy Firebase instance containing data from users who registered before February 2024. Tea had promised to delete verification images immediately after account approval. The images were never deleted. 13,000 selfies paired with government-issued photo IDs, plus 59,000 additional images from posts and direct messages. Accessed by hackers who found an unsecured Firebase endpoint and exploited it directly.<\/p>\n<\/p><\/div>\n<div style=\"border:1px solid #EEF1FB;padding:20px 22px;border-radius:2px;\">\n<div style=\"font-size:11px;font-weight:700;letter-spacing:0.15em;text-transform:uppercase;color:#D94040;margin-bottom:10px;\">Breach 2 \u2014 The private messages<\/div>\n<p style=\"font-size:15px;color:#333;margin:0;line-height:1.65;\">A separate Firebase configuration where the stored messages were neither encrypted nor access-restricted. Any user with an API key could query the database directly. Researcher Rahjerdi found that 1.1 million private messages spanning from early 2023 to July 2025 were accessible. The messages included deeply personal disclosures \u2014 divorce, abortion, infidelity, sexual assault. Many contained identifying information: real names, phone numbers, meeting locations. Tea disabled direct messaging on July 29 to stop further exposure.<\/p>\n<\/p><\/div>\n<\/div>\n<h2 style=\"font-size:22px;font-weight:600;color:#111;margin:40px 0 14px;padding-bottom:10px;border-bottom:2px solid #EEF1FB;\">Three misconfigurations that caused it<\/h2>\n<p><!-- THREE FAILURES --><\/p>\n<div style=\"margin:20px 0 32px;display:flex;flex-direction:column;gap:2px;\">\n<div style=\"display:flex;align-items:flex-start;gap:16px;padding:15px 18px;background:#FAFBFF;border:1px solid #EEF1FB;\">\n    <span style=\"background:#1C267A;color:white;font-size:12px;font-weight:700;width:26px;height:26px;border-radius:50%;display:flex;align-items:center;justify-content:center;flex-shrink:0;margin-top:1px;\">1<\/span><\/p>\n<div>\n<div style=\"font-size:14px;font-weight:600;color:#111;margin-bottom:4px;\">Data that was promised to be deleted was never deleted<\/div>\n<div style=\"font-size:14px;color:#555;line-height:1.65;\">Tea told users that government ID verification images would be deleted immediately after account approval. Those images remained on legacy servers, out of sight, for over a year. A data lifecycle policy that was communicated to users simply did not exist in the infrastructure. The gap between the privacy promise and the actual data handling practice was the entry point.<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div style=\"display:flex;align-items:flex-start;gap:16px;padding:15px 18px;background:#FAFBFF;border:1px solid #EEF1FB;\">\n    <span style=\"background:#1C267A;color:white;font-size:12px;font-weight:700;width:26px;height:26px;border-radius:50%;display:flex;align-items:center;justify-content:center;flex-shrink:0;margin-top:1px;\">2<\/span><\/p>\n<div>\n<div style=\"font-size:14px;font-weight:600;color:#111;margin-bottom:4px;\">Firebase configured without encryption or access controls<\/div>\n<div style=\"font-size:14px;color:#555;line-height:1.65;\">Firebase is a legitimate, widely used platform. But using Firebase doesn&#8217;t inherit its security defaults. Tea&#8217;s implementation left image and message data neither encrypted at rest nor access-restricted. The Firebase API was public-facing. Anyone who found the endpoint and had an API key could retrieve raw user data. This is a configuration choice, not a platform vulnerability. The platform was fine. The configuration was not.<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div style=\"display:flex;align-items:flex-start;gap:16px;padding:15px 18px;background:#FAFBFF;border:1px solid #EEF1FB;\">\n    <span style=\"background:#1C267A;color:white;font-size:12px;font-weight:700;width:26px;height:26px;border-radius:50%;display:flex;align-items:center;justify-content:center;flex-shrink:0;margin-top:1px;\">3<\/span><\/p>\n<div>\n<div style=\"font-size:14px;font-weight:600;color:#111;margin-bottom:4px;\">Legacy systems left running without audit or monitoring<\/div>\n<div style=\"font-size:14px;color:#555;line-height:1.65;\">The compromised database was a legacy instance. Tea had migrated forward but the old database remained active, accessible, and unmonitored. No continuous cloud posture management was running to flag the exposure. No audit had been run to map what data lived where. It was simply forgotten infrastructure that hadn&#8217;t been decommissioned.<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/div>\n<h2 style=\"font-size:22px;font-weight:600;color:#111;margin:40px 0 14px;padding-bottom:10px;border-bottom:2px solid #EEF1FB;\">What happened after the data was public<\/h2>\n<p style=\"font-size:17px;line-height:1.75;color:#333;\">The consequences of this breach were not abstract. Within hours of the data being posted, a 4chan thread shared a custom Google Map purporting to tie the leaked verification images to the locations of women registered on the app. The thread was later deleted. Users reported being identifiable from their government IDs paired with their selfies.<\/p>\n<p style=\"font-size:17px;line-height:1.75;color:#333;\">The 1.1 million messages contained information that made most users&#8217; real-world identities trivial to determine: names, phone numbers, meeting locations, combined with deeply personal disclosures. Two class action lawsuits were filed in California. Tea offered free identity protection services to affected users.<\/p>\n<blockquote style=\"margin:28px 0;padding:22px 28px;background:#EEF1FB;border-left:5px solid #1C267A;border-radius:2px;\">\n<p style=\"font-size:17px;font-style:italic;font-weight:500;color:#1C267A;margin:0;line-height:1.7;\">An app whose core promise was protecting women&#8217;s safety in dating became the mechanism through which their identities, locations, and most private conversations were exposed. The breach didn&#8217;t undermine the brand. It directly contradicted everything the product was supposed to be.<\/p>\n<\/blockquote>\n<h2 style=\"font-size:22px;font-weight:600;color:#111;margin:40px 0 14px;padding-bottom:10px;border-bottom:2px solid #EEF1FB;\">The pattern that keeps repeating<\/h2>\n<p style=\"font-size:17px;line-height:1.75;color:#333;\">This breach follows an entirely familiar pattern. A company promises to delete sensitive data, does not build the process to actually do it, runs a secondary database without monitoring, and discovers the gap when a researcher or attacker finds it first.<\/p>\n<p style=\"font-size:17px;line-height:1.75;color:#333;\">The Tea breach is not a story about a sophisticated attacker. It is a story about a company that grew fast \u2014 Tea became the number one free app on the US App Store before this incident \u2014 and whose security infrastructure did not grow with it. Legacy systems were not audited. Data lifecycle policies were not enforced in the infrastructure. Cloud configuration was not independently verified.<\/p>\n<p><!-- WHAT WOULD HAVE PREVENTED IT --><\/p>\n<ul style=\"margin:16px 0 28px;padding-left:0;list-style:none;\">\n<li style=\"display:flex;align-items:flex-start;gap:12px;padding:12px 16px;background:#F5FFF5;border-left:3px solid #2a7a2a;margin-bottom:8px;font-size:15px;color:#333;line-height:1.5;\">\n    <span style=\"color:#2a7a2a;font-size:16px;flex-shrink:0;margin-top:2px;\">\u2713<\/span><br \/>\n    <span><strong>Continuous cloud posture management<\/strong> that maps every active storage instance, flags publicly accessible resources, and alerts when data that should be restricted is exposed.<\/span>\n  <\/li>\n<li style=\"display:flex;align-items:flex-start;gap:12px;padding:12px 16px;background:#F5FFF5;border-left:3px solid #2a7a2a;margin-bottom:8px;font-size:15px;color:#333;line-height:1.5;\">\n    <span style=\"color:#2a7a2a;font-size:16px;flex-shrink:0;margin-top:2px;\">\u2713<\/span><br \/>\n    <span><strong>Data lifecycle enforcement<\/strong> that translates privacy promises into actual deletion workflows. If Tea&#8217;s infrastructure had enforced the deletion it promised, there would have been nothing to leak.<\/span>\n  <\/li>\n<li style=\"display:flex;align-items:flex-start;gap:12px;padding:12px 16px;background:#F5FFF5;border-left:3px solid #2a7a2a;margin-bottom:8px;font-size:15px;color:#333;line-height:1.5;\">\n    <span style=\"color:#2a7a2a;font-size:16px;flex-shrink:0;margin-top:2px;\">\u2713<\/span><br \/>\n    <span><strong>Encryption at rest for sensitive user data<\/strong> \u2014 particularly any data involving identity verification. An encrypted database does not become usable when someone gains access to the endpoint.<\/span>\n  <\/li>\n<li style=\"display:flex;align-items:flex-start;gap:12px;padding:12px 16px;background:#F5FFF5;border-left:3px solid #2a7a2a;margin-bottom:8px;font-size:15px;color:#333;line-height:1.5;\">\n    <span style=\"color:#2a7a2a;font-size:16px;flex-shrink:0;margin-top:2px;\">\u2713<\/span><br \/>\n    <span><strong>Regular audits of legacy and decommissioned systems<\/strong> to ensure that databases believed to be unused are not still running, still accessible, and still holding data.<\/span>\n  <\/li>\n<\/ul>\n<p style=\"font-size:17px;line-height:1.75;color:#333;\">The Tea breach is particularly instructive because none of the failures were novel. Misconfigured Firebase. Undeleted legacy data. No access controls on sensitive storage. These are documented, well-understood problems with known solutions. The breach happened not because the solutions didn&#8217;t exist but because nobody had run the check.<\/p>\n<p><!-- INTEGRATED OSTO CTA --><\/p>\n<div style=\"background:#1C267A;padding:32px 36px;border-radius:2px;margin-top:48px;\">\n<div style=\"font-size:11px;font-weight:700;letter-spacing:0.2em;text-transform:uppercase;color:rgba(255,255,255,0.45);margin-bottom:12px;\">The check that wasn&#8217;t run<\/div>\n<p style=\"font-size:17px;font-weight:600;color:white;margin:0 0 14px;line-height:1.5;\">Cloud misconfigurations and legacy data exposures are the most common source of breaches that should never have happened.<\/p>\n<p style=\"font-size:15px;color:rgba(255,255,255,0.75);margin:0 0 14px;line-height:1.75;\">Osto runs continuous cloud posture management across your environment, flagging misconfigured storage, unencrypted data, and publicly accessible resources before an attacker or researcher finds them. For companies handling identity or sensitive user data, this isn&#8217;t optional infrastructure. It&#8217;s the check that tells you whether your privacy promises match your actual configuration.<\/p>\n<p style=\"font-size:15px;color:rgba(255,255,255,0.75);margin:0 0 24px;line-height:1.75;\">If you haven&#8217;t audited your cloud environment recently, the honest answer is that you don&#8217;t know what&#8217;s sitting in a legacy instance that nobody has looked at in 18 months.<\/p>\n<p>  <a href=\"https:\/\/osto.one\" style=\"display:inline-block;background:#C8FF00;color:#1C267A;font-size:13px;font-weight:700;padding:12px 24px;text-decoration:none;letter-spacing:0.05em;border-radius:2px;\">Talk to us at Osto<\/a>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Tea is a women-only dating safety app with 1.6 million users in the United States. Its entire value proposition is\u2026<\/p>\n","protected":false},"author":5,"featured_media":250,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[38],"tags":[46,47,43,44,45],"class_list":["post-225","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-incidents","tag-app-security","tag-cybersecurity","tag-data-breach","tag-privacy","tag-women-safety"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Women&#039;s Safety App Exposes 1.1M Private Messages<\/title>\n<meta name=\"description\" content=\"A women&#039;s safety app accidentally exposed 1.1 million private messages, raising serious concerns about data privacy and app security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.osto.one\/resources\/incidents\/womens-safety-app-exposes-private-messages-data-breach\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Women&#039;s Safety App Exposes 1.1 Million Private Messages\" \/>\n<meta property=\"og:description\" content=\"A women&#039;s safety app accidentally exposed 1.1 million private messages, raising serious concerns about data privacy and app security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.osto.one\/resources\/incidents\/womens-safety-app-exposes-private-messages-data-breach\/\" \/>\n<meta property=\"og:site_name\" content=\"Osto\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-01T05:07:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-06T16:28:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.osto.one\/resources\/wp-content\/uploads\/2026\/05\/ChatGPT-Image-May-1-2026-12_00_51-PM.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Ansh Satwani\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ansh Satwani\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.osto.one\/resources\/incidents\/womens-safety-app-exposes-private-messages-data-breach\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.osto.one\/resources\/incidents\/womens-safety-app-exposes-private-messages-data-breach\/\"},\"author\":{\"name\":\"Ansh Satwani\",\"@id\":\"https:\/\/www.osto.one\/resources\/#\/schema\/person\/4e82cd35cf60206ad1232e7d2d255144\"},\"headline\":\"The App Built to Keep Women Safe Just Exposed 1.1 Million of Their Private Messages\",\"datePublished\":\"2026-05-01T05:07:51+00:00\",\"dateModified\":\"2026-05-06T16:28:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.osto.one\/resources\/incidents\/womens-safety-app-exposes-private-messages-data-breach\/\"},\"wordCount\":1050,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.osto.one\/resources\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.osto.one\/resources\/incidents\/womens-safety-app-exposes-private-messages-data-breach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.osto.one\/resources\/wp-content\/uploads\/2026\/05\/ChatGPT-Image-May-1-2026-12_00_51-PM.png\",\"keywords\":[\"app security\",\"cybersecurity\",\"data breach\",\"privacy\",\"women safety\"],\"articleSection\":[\"Incidents\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.osto.one\/resources\/incidents\/womens-safety-app-exposes-private-messages-data-breach\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.osto.one\/resources\/incidents\/womens-safety-app-exposes-private-messages-data-breach\/\",\"url\":\"https:\/\/www.osto.one\/resources\/incidents\/womens-safety-app-exposes-private-messages-data-breach\/\",\"name\":\"Women's Safety App Exposes 1.1M Private Messages\",\"isPartOf\":{\"@id\":\"https:\/\/www.osto.one\/resources\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.osto.one\/resources\/incidents\/womens-safety-app-exposes-private-messages-data-breach\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.osto.one\/resources\/incidents\/womens-safety-app-exposes-private-messages-data-breach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.osto.one\/resources\/wp-content\/uploads\/2026\/05\/ChatGPT-Image-May-1-2026-12_00_51-PM.png\",\"datePublished\":\"2026-05-01T05:07:51+00:00\",\"dateModified\":\"2026-05-06T16:28:11+00:00\",\"description\":\"A women's safety app accidentally exposed 1.1 million private messages, raising serious concerns about data privacy and app security.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.osto.one\/resources\/incidents\/womens-safety-app-exposes-private-messages-data-breach\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.osto.one\/resources\/incidents\/womens-safety-app-exposes-private-messages-data-breach\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.osto.one\/resources\/incidents\/womens-safety-app-exposes-private-messages-data-breach\/#primaryimage\",\"url\":\"https:\/\/www.osto.one\/resources\/wp-content\/uploads\/2026\/05\/ChatGPT-Image-May-1-2026-12_00_51-PM.png\",\"contentUrl\":\"https:\/\/www.osto.one\/resources\/wp-content\/uploads\/2026\/05\/ChatGPT-Image-May-1-2026-12_00_51-PM.png\",\"width\":1536,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.osto.one\/resources\/incidents\/womens-safety-app-exposes-private-messages-data-breach\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.osto.one\/resources\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The App Built to Keep Women Safe Just Exposed 1.1 Million of Their Private Messages\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.osto.one\/resources\/#website\",\"url\":\"https:\/\/www.osto.one\/resources\/\",\"name\":\"Osto\",\"description\":\"Osto secures apps, networks, and endpoints with an integrated platform built for modern teams.\",\"publisher\":{\"@id\":\"https:\/\/www.osto.one\/resources\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.osto.one\/resources\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.osto.one\/resources\/#organization\",\"name\":\"Osto\",\"url\":\"https:\/\/www.osto.one\/resources\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.osto.one\/resources\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.osto.one\/resources\/wp-content\/uploads\/2026\/01\/cropped-osto-blue-21-edited.png\",\"contentUrl\":\"https:\/\/www.osto.one\/resources\/wp-content\/uploads\/2026\/01\/cropped-osto-blue-21-edited.png\",\"width\":1144,\"height\":428,\"caption\":\"Osto\"},\"image\":{\"@id\":\"https:\/\/www.osto.one\/resources\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.osto.one\/resources\/#\/schema\/person\/4e82cd35cf60206ad1232e7d2d255144\",\"name\":\"Ansh Satwani\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.osto.one\/resources\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/febb3eb0d31b99257e1d641255c28ad967bb930f531f6f2997f0bea21fd977c9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/febb3eb0d31b99257e1d641255c28ad967bb930f531f6f2997f0bea21fd977c9?s=96&d=mm&r=g\",\"caption\":\"Ansh Satwani\"},\"url\":\"https:\/\/www.osto.one\/resources\/author\/ansh\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Women's Safety App Exposes 1.1M Private Messages","description":"A women's safety app accidentally exposed 1.1 million private messages, raising serious concerns about data privacy and app security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.osto.one\/resources\/incidents\/womens-safety-app-exposes-private-messages-data-breach\/","og_locale":"en_US","og_type":"article","og_title":"Women's Safety App Exposes 1.1 Million Private Messages","og_description":"A women's safety app accidentally exposed 1.1 million private messages, raising serious concerns about data privacy and app security.","og_url":"https:\/\/www.osto.one\/resources\/incidents\/womens-safety-app-exposes-private-messages-data-breach\/","og_site_name":"Osto","article_published_time":"2026-05-01T05:07:51+00:00","article_modified_time":"2026-05-06T16:28:11+00:00","og_image":[{"width":1536,"height":1024,"url":"https:\/\/www.osto.one\/resources\/wp-content\/uploads\/2026\/05\/ChatGPT-Image-May-1-2026-12_00_51-PM.png","type":"image\/png"}],"author":"Ansh Satwani","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ansh Satwani","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.osto.one\/resources\/incidents\/womens-safety-app-exposes-private-messages-data-breach\/#article","isPartOf":{"@id":"https:\/\/www.osto.one\/resources\/incidents\/womens-safety-app-exposes-private-messages-data-breach\/"},"author":{"name":"Ansh Satwani","@id":"https:\/\/www.osto.one\/resources\/#\/schema\/person\/4e82cd35cf60206ad1232e7d2d255144"},"headline":"The App Built to Keep Women Safe Just Exposed 1.1 Million of Their Private Messages","datePublished":"2026-05-01T05:07:51+00:00","dateModified":"2026-05-06T16:28:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.osto.one\/resources\/incidents\/womens-safety-app-exposes-private-messages-data-breach\/"},"wordCount":1050,"commentCount":0,"publisher":{"@id":"https:\/\/www.osto.one\/resources\/#organization"},"image":{"@id":"https:\/\/www.osto.one\/resources\/incidents\/womens-safety-app-exposes-private-messages-data-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.osto.one\/resources\/wp-content\/uploads\/2026\/05\/ChatGPT-Image-May-1-2026-12_00_51-PM.png","keywords":["app security","cybersecurity","data breach","privacy","women safety"],"articleSection":["Incidents"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.osto.one\/resources\/incidents\/womens-safety-app-exposes-private-messages-data-breach\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.osto.one\/resources\/incidents\/womens-safety-app-exposes-private-messages-data-breach\/","url":"https:\/\/www.osto.one\/resources\/incidents\/womens-safety-app-exposes-private-messages-data-breach\/","name":"Women's Safety App Exposes 1.1M Private Messages","isPartOf":{"@id":"https:\/\/www.osto.one\/resources\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.osto.one\/resources\/incidents\/womens-safety-app-exposes-private-messages-data-breach\/#primaryimage"},"image":{"@id":"https:\/\/www.osto.one\/resources\/incidents\/womens-safety-app-exposes-private-messages-data-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.osto.one\/resources\/wp-content\/uploads\/2026\/05\/ChatGPT-Image-May-1-2026-12_00_51-PM.png","datePublished":"2026-05-01T05:07:51+00:00","dateModified":"2026-05-06T16:28:11+00:00","description":"A women's safety app accidentally exposed 1.1 million private messages, raising serious concerns about data privacy and app security.","breadcrumb":{"@id":"https:\/\/www.osto.one\/resources\/incidents\/womens-safety-app-exposes-private-messages-data-breach\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.osto.one\/resources\/incidents\/womens-safety-app-exposes-private-messages-data-breach\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.osto.one\/resources\/incidents\/womens-safety-app-exposes-private-messages-data-breach\/#primaryimage","url":"https:\/\/www.osto.one\/resources\/wp-content\/uploads\/2026\/05\/ChatGPT-Image-May-1-2026-12_00_51-PM.png","contentUrl":"https:\/\/www.osto.one\/resources\/wp-content\/uploads\/2026\/05\/ChatGPT-Image-May-1-2026-12_00_51-PM.png","width":1536,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.osto.one\/resources\/incidents\/womens-safety-app-exposes-private-messages-data-breach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.osto.one\/resources\/"},{"@type":"ListItem","position":2,"name":"The App Built to Keep Women Safe Just Exposed 1.1 Million of Their Private Messages"}]},{"@type":"WebSite","@id":"https:\/\/www.osto.one\/resources\/#website","url":"https:\/\/www.osto.one\/resources\/","name":"Osto","description":"Osto secures apps, networks, and endpoints with an integrated platform built for modern teams.","publisher":{"@id":"https:\/\/www.osto.one\/resources\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.osto.one\/resources\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.osto.one\/resources\/#organization","name":"Osto","url":"https:\/\/www.osto.one\/resources\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.osto.one\/resources\/#\/schema\/logo\/image\/","url":"https:\/\/www.osto.one\/resources\/wp-content\/uploads\/2026\/01\/cropped-osto-blue-21-edited.png","contentUrl":"https:\/\/www.osto.one\/resources\/wp-content\/uploads\/2026\/01\/cropped-osto-blue-21-edited.png","width":1144,"height":428,"caption":"Osto"},"image":{"@id":"https:\/\/www.osto.one\/resources\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.osto.one\/resources\/#\/schema\/person\/4e82cd35cf60206ad1232e7d2d255144","name":"Ansh Satwani","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.osto.one\/resources\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/febb3eb0d31b99257e1d641255c28ad967bb930f531f6f2997f0bea21fd977c9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/febb3eb0d31b99257e1d641255c28ad967bb930f531f6f2997f0bea21fd977c9?s=96&d=mm&r=g","caption":"Ansh Satwani"},"url":"https:\/\/www.osto.one\/resources\/author\/ansh\/"}]}},"_links":{"self":[{"href":"https:\/\/www.osto.one\/resources\/wp-json\/wp\/v2\/posts\/225","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.osto.one\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.osto.one\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.osto.one\/resources\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.osto.one\/resources\/wp-json\/wp\/v2\/comments?post=225"}],"version-history":[{"count":1,"href":"https:\/\/www.osto.one\/resources\/wp-json\/wp\/v2\/posts\/225\/revisions"}],"predecessor-version":[{"id":229,"href":"https:\/\/www.osto.one\/resources\/wp-json\/wp\/v2\/posts\/225\/revisions\/229"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.osto.one\/resources\/wp-json\/wp\/v2\/media\/250"}],"wp:attachment":[{"href":"https:\/\/www.osto.one\/resources\/wp-json\/wp\/v2\/media?parent=225"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.osto.one\/resources\/wp-json\/wp\/v2\/categories?post=225"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.osto.one\/resources\/wp-json\/wp\/v2\/tags?post=225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}