Home Vulnerabilities No, your Grindr activity is not necessarily private

No, your Grindr activity is not necessarily private

No, your Grindr activity is not necessarily private - just ask the senior Catholic priest who was outed and lost his job

Monsignor Jeffrey Burrill has resigned as the general secretary of the US Conference of Catholic Bishops (USCBB), after The Pillar newsletter claimed he was a regular user of gay-dating app Grindr:

…an analysis of app data signals correlated to Burrill’s mobile device shows the priest also visited gay bars and private residences while using a location-based hookup app in numerous cities from 2018 to 2020, even while traveling on assignment for the U.S. bishops’ conference.

According to commercially available records of app signal data obtained by The Pillar, a mobile device correlated to Burrill emitted app data signals from the location-based hookup app Grindr on a near-daily basis during parts of 2018, 2019, and 2020 — at both his USCCB office and his USCCB-owned residence, as well as during USCCB meetings and events in other cities.

Burrill has since resigned his position.

You may or may not believe that a gay lifestyle is incompatible with being a senior Catholic cleric – personally I couldn’t care what Monsignor Burrill gets up to in his private life, as long as he’s not hurting anyone or breaking the law.

Sign up to our newsletter
Security news, advice, and tips.

But what does disturb me is that if it’s possible for someone to purchase supposedly anonymous, aggregated location data collected by Grindr to out a Catholic priest, then it could presumably be done against any other user of the service.

Apps claim all the time that they collect no personally identifiable information from their users, and yet – once again – we discover that when there’s enough data gathered it is often possible to de-anonymise it and identify individuals.

This is a concern for everyone. Grindr user or not. Catholic priest or not.

Found this article interesting? Follow Graham Cluley on Twitter to read more of the exclusive content we post.

Graham Cluley is a veteran of the anti-virus industry having worked for a number of security companies since the early 1990s when he wrote the first ever version of Dr Solomon’s Anti-Virus Toolkit for Windows. Now an independent security analyst, he regularly makes media appearances and is an international public speaker on the topic of computer security, hackers, and online privacy.

Follow him on Twitter at @gcluley, or drop him an email.

Source link


New infosec products of the week: July 23, 2021

Stellar Cyber XDR Kill Chain allows security analyst teams to disrupt cyberattacks Stellar Cyber introduced a...

Kaseya Gets Universal Decryptor to Help REvil Ransomware Victims

Nearly three weeks after Florida-based software vendor Kaseya was hit by a widespread supply-chain ransomware attack, the company on Thursday said it obtained...

Kaseya obtains REvil decryptor, starts sharing it with afflicted customers • The Register

Software-for-services providers business Kaseya has obtained a "universal decryptor key" for the REvil ransomware and is delivering it to clients. A brief Thursday update...
- Advertisment -

Most Popular

Former Goldman Sachs CIO, joins fintech start-up Advisory Board

illumr removes bias in AI for financial services organisationsDamian Sutcliffe, the former EMEA CIO for Goldman Sachs...

Hackers Posed as Aerobics Instructors for Years to Target Aerospace Employees

An Iranian cyberespionage group masqueraded as an aerobics instructor on Facebook in an attempt to infect the machine of an employee of an...

Security breaches where working from home is involved are costlier, claims IBM report • The Register

Firms looking to save money by shifting to more flexible ways of working will need to think carefully about IT security and the...

Recent Comments