🎤 Cheer for Your Idol · Gate Takes You Straight to Token of Love! 🎶
Fam, head to Gate Square now and cheer for #TokenOfLove# — 20 music festival tickets are waiting for you! 🔥
HyunA / SUECO / DJ KAKA / CLICK#15 — Who are you most excited to see? Let’s cheer together!
📌 How to Join (the more ways you join, the higher your chance of winning!)
1️⃣ Interact with This Post
Like & Retweet + vote for your favorite artist
Comment: “I’m cheering for Token of Love on Gate Square!”
2️⃣ Post on Gate Square
Use hashtags: #ArtistName# + #TokenOfLove#
Post any content you like:
🎵 The song you want to he
Tea Data Breach Turns Women’s Safety into a Hackers’ Playground
In Brief
Tea app’s data breach exposed 72,000 files and 1.1 million private messages, highlighting the dangers of centralized ID storage and the need for decentralized systems to protect users.
Kee Jefferys, co-founder of the decentralized messenger Session, shared his perspective on the recent Tea app data breach, explaining how the incident highlights the dangers of centralized ID storage and why decentralized systems are better suited to protect users.
Tea, the app designed for women that promised a safer dating experience, has shut down its messaging system following one of the largest data breaches of the year. What started as a viral platform to help women flag potentially dangerous men ended with millions of private conversations and ID documents being shared on leak forums.
The breach, revealed in late July, affected users who joined before February 2024. At least 72,000 files were exposed, including government IDs that the company had promised to delete after verification. On top of that, over 1.1 million private messages were compromised, ranging from everyday chats to highly sensitive discussions about abuse and health.
Security experts say the collapse was inevitable. Kee Jefferys pointed out that systems that collect and centralize personal identifiers create the ultimate target. Once a database contains IDs, selfies, and unencrypted metadata, attackers only need to break in once to access everything.
From Promise to Exposure
Tea became popular by providing tools to reverse-image search dating profiles, run background checks, and create a supposedly secure space for women. However, its reliance on mandatory selfie-ID verification was a fundamental flaw.
According to investigators, the first leak happened when an unsecured storage bucket, apparently set up for compliance requests, was left exposed. Files that should have been deleted were still accessible and were quickly copied. A few days later, a separate vulnerability allowed attackers to download entire message archives in bulk, without any rate limits or encryption to slow them down.
What was sold as protection instead gave potential abusers a detailed map of user interactions, complete with timestamps and location data.
Why Centralization Fails?
Take the Tea case, for instance. It underscores the ongoing issues with centralized systems: storing sensitive information indefinitely, relying on single points of failure, and lacking strong encryption. Unlike passwords, biometric data like faces can’t be easily changed if leaked. Stolen selfies can be used for identity theft, deepfakes, or setting up fake accounts.
Jefferys notes that even if data is encrypted when stored, it’s not much help if the encryption keys are stored alongside it. The “who, when, and where” of digital conversations, known as metadata, remains particularly vulnerable to those trying to evade surveillance or harassment.
What Could Be Done Differently?
Alternative designs exist that could have prevented such a collapse:
According to Jefferys, adopting these principles would make it vastly harder for attackers to extract meaningful data. Instead of one breach exposing everything, multiple decentralized barriers would have to be broken at once.
Time for Regulators to Act
Tea’s defense, citing retained IDs for potential investigations, reveals a broader policy gap. Regulators increasingly require digital ID verification but seldom enforce strict deletion rules or decentralized safeguards. Without these measures, new apps may repeat past mistakes under the guise of safety.
The collapse of Tea illustrates how rapidly trust can dissipate when private information is mishandled. Safety-focused platforms cannot rely solely on promises. Unless they abandon centralized ID storage and adopt privacy-centric designs, they risk becoming less a refuge for women than a blueprint for those who wish to harm them.