{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T19:16:58Z","timestamp":1770578218089,"version":"3.49.0"},"reference-count":29,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2022,2,27]],"date-time":"2022-02-27T00:00:00Z","timestamp":1645920000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e Tecnologia","doi-asserted-by":"publisher","award":["UIDB-04524-2020"],"award-info":[{"award-number":["UIDB-04524-2020"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Forensic Sciences"],"abstract":"<jats:p>Mobile applications that facilitate interaction between people have grown in popularity and, as a result, the number of e-dating applications have expanded. In these types of applications, there is usually a trade-off between user privacy and safety. On one hand, users want to keep their data as private as possible, on the other hand, user identification forces accountability, which, hopefully, will foster the development of responsible behaviors and minimize abuses. The Bumble e-dating app has been growing in popularity and differs from other apps by giving women the power to make the first contact after a match. Their main goal is to prevent women\u2019s harassment. In this work, we study the digital artifacts that can be found after the use of the Bumble app on Android devices. Despite applying many measures to ensure data protection, it was possible to obtain information that identifies users and exchanged messages. The data structure stored on the device is described, as well as the artifacts with forensic value for an investigation. Moreover, a script was created to parse and visualize the main forensic artifacts of the Bumble app.<\/jats:p>","DOI":"10.3390\/forensicsci2010016","type":"journal-article","created":{"date-parts":[[2022,2,27]],"date-time":"2022-02-27T20:46:17Z","timestamp":1645994777000},"page":"201-221","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Forensic Analysis of the Bumble Dating App for Android"],"prefix":"10.3390","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9331-3334","authenticated-orcid":false,"given":"Ant\u00f3nio","family":"Barros","sequence":"first","affiliation":[{"name":"School of Technology and Management (ESTG), Polytechnic of Leiria, Morro do Lena\u2014Alto do Vieiro, 2411-901 Leiria, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6147-4013","authenticated-orcid":false,"given":"Rafaela","family":"Almeida","sequence":"additional","affiliation":[{"name":"School of Technology and Management (ESTG), Polytechnic of Leiria, Morro do Lena\u2014Alto do Vieiro, 2411-901 Leiria, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2484-7751","authenticated-orcid":false,"given":"Ti\u00e9zer","family":"Melo","sequence":"additional","affiliation":[{"name":"School of Technology and Management (ESTG), Polytechnic of Leiria, Morro do Lena\u2014Alto do Vieiro, 2411-901 Leiria, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4405-7696","authenticated-orcid":false,"given":"Miguel","family":"Frade","sequence":"additional","affiliation":[{"name":"School of Technology and Management (ESTG), Polytechnic of Leiria, Morro do Lena\u2014Alto do Vieiro, 2411-901 Leiria, Portugal"},{"name":"Computer Science and Communication Research Centre (CIIC), Polytechnic of Leiria, Morro do Lena\u2014Alto do Vieiro, 2411-901 Leiria, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2022,2,27]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Sathe, S.C., and Dongre, N.M. (2018, January 19\u201320). Data acquisition techniques in mobile forensics. Proceedings of the 2018 2nd International Conference on Inventive Systems and Control (ICISC), Coimbatore, India.","DOI":"10.1109\/ICISC.2018.8399079"},{"key":"ref_2","unstructured":"Alter, C. (2021, December 28). Whitney Wolfe Wants to Beat Tinder at Its Own Game. Time, Available online: https:\/\/time.com\/3851583\/bumble-whitney-wolfe\/."},{"key":"ref_3","unstructured":"(2021, December 14). Bumble-Date, Meet, Network Better. Available online: https:\/\/bumble.com."},{"key":"ref_4","unstructured":"Yashari, L. (2021, December 28). Bumble C.E.O. Tries to Change Dating After Dramatic Tinder Exit. Vanity Fair, Available online: https:\/\/www.vanityfair.com\/culture\/2015\/08\/bumble-app-whitney-wolfe."},{"key":"ref_5","unstructured":"(2021, December 16). Bumble Revenue and Usage Statistics (2021). Available online: https:\/\/www.businessofapps.com\/data\/bumble-statistics."},{"key":"ref_6","unstructured":"Branson, J. (2021, December 16). Bumble Statistics and Facts in 2021 [with Charts]. Available online: https:\/\/boostmatches.com\/bumble-statistics."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"822","DOI":"10.1080\/14680777.2018.1494618","article-title":"The construction of gender in dating apps: An interface analysis of Tinder and Bumble","volume":"19","author":"MacLeod","year":"2019","journal-title":"Fem. Media Stud."},{"key":"ref_8","unstructured":"(2021, December 21). Bumble-Bumble\u2019s Latest Safety Feature Uses A.I. to Blur Unwanted Nude Photos. Available online: https:\/\/bumble.com\/en-us\/the-buzz\/privatedetector."},{"key":"ref_9","unstructured":"(2021, December 16). Bumble-Privacy. Available online: https:\/\/bumble.com\/en\/privacy."},{"key":"ref_10","unstructured":"FBI, I.C.C.C. (2021, December 22). Internet Crime Report 2020, Available online: https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2020_IC3Report.pdf."},{"key":"ref_11","unstructured":"Hayes, D.R., and Snow, C. (November, January 31). Privacy and Security Issues Associated with Mobile Dating Applications. Proceedings of the Conference on Information Systems Applied Research ISSN 2473-3857, Norfolk, Virginia."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Kim, K., Kim, T., Lee, S., Kim, S., and Kim, H. (2018, January 28\u201330). When harry met tinder: Security analysis of dating apps on android. Proceedings of the Nordic Conference on Secure IT Systems, Oslo, Norway.","DOI":"10.1007\/978-3-030-03638-6_28"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1109\/TSUSC.2017.2783858","article-title":"Are you dating danger? an interdisciplinary approach to evaluating the (in) security of android dating apps","volume":"6","author":"Shetty","year":"2017","journal-title":"IEEE Trans. Sustain. Comput."},{"key":"ref_14","unstructured":"Farnden, J., Martini, B., and Choo, K.K.R. (2015). Privacy risks in mobile dating apps. arXiv."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Leith, D.J. (2021, January 6\u20139). Mobile Handset Privacy: Measuring The Data iOS and Android Send to Apple And Google. Proceedings of the International Conference on Security and Privacy in Communication Systems, online.","DOI":"10.1007\/978-3-030-90022-9_12"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Bays, J., and Karabiyik, U. (May, January 29). Forensic Analysis of Third Party Location Applications in Android and iOS. Proceedings of the IEEE INFOCOM 2019\u2014IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Paris, France.","DOI":"10.1109\/INFOCOMWKSHPS47286.2019.9093781"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Kim, H., Kim, D., Jo, W., and Shon, T. (2019, January 28\u201330). Digital Forensic Analysis using Android Application Cache Data. Proceedings of the 2019 International Conference on Platform Technology and Service (PlatCon), Jeju, Korea.","DOI":"10.1109\/PlatCon.2019.8669409"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Hutchinson, S., Shantaram, N., and Karabiyik, U. (January, January 29). Forensic Analysis of Dating Applications on Android and iOS Devices. Proceedings of the 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Guangzhou, China.","DOI":"10.1109\/TrustCom50675.2020.00113"},{"key":"ref_19","unstructured":"(2021, December 16). Mobile App Analysis Part 5\u2014The Leahy Center for Digital Forensics & Cybersecurity. Available online: https:\/\/leahycenterblog.champlain.edu\/2017\/04\/14\/mobile-app-analysis-part-5\/."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"101833","DOI":"10.1016\/j.cose.2020.101833","article-title":"What\u2019s really \u2018Happning\u2019? A forensic analysis of Android and iOS Happn dating apps","volume":"94","author":"Knox","year":"2020","journal-title":"Comput. Secur."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"100055","DOI":"10.1016\/j.chbr.2021.100055","article-title":"Threaten me softly: A review of potential dating app risks","volume":"3","author":"Phan","year":"2021","journal-title":"Comput. Hum. Behav. Rep."},{"key":"ref_22","unstructured":"Fatehi, S. (2021, December 16). SchemaCrawler. Available online: https:\/\/www.schemacrawler.com\/."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Shang, S., Wu, Q., Wang, T., and Shao, Z. (2021, January 18\u201321). LiteIndex: Memory-Efficient Schema-Agnostic Indexing for JSON documents in SQLite. Proceedings of the 26th Asia and South Pacific Design Automation Conference, Tokyo, Japan.","DOI":"10.1145\/3394885.3431518"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Domingues, P., Nogueira, R., Francisco, J.C., and Frade, M. (2020, January 25\u201328). Post-mortem digital forensic artifacts of TikTok Android App. Proceedings of the 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland.","DOI":"10.1145\/3407023.3409203"},{"key":"ref_25","unstructured":"(2022, February 01). Firebase\u2019s Official Documentation|com.google.android.gms.measurement. Available online: https:\/\/firebase.google.com\/docs\/reference\/android\/com\/google\/android\/gms\/measurement\/package-summary."},{"key":"ref_26","unstructured":"(2021, December 16). National Vulnerability Database\u2014Vulnerability Metrics, Available online: https:\/\/nvd.nist.gov\/vuln-metrics\/cvss."},{"key":"ref_27","unstructured":"(2021, February 02). Contributors to Wikimedia Projects. HTTP Public Key Pinning\u2014Wikipedia. Available online: https:\/\/en.wikipedia.org\/w\/index.php?title=HTTP_Public_Key_Pinning&oldid=1056993476."},{"key":"ref_28","unstructured":"Frade, M. (2021, February 02). Android Network Traffic Interception. Available online: https:\/\/github.com\/labcif\/Tutorial-AndroidNetworkInterception."},{"key":"ref_29","unstructured":"Almeida, R., Barros, A., and Melo, T. (2021, December 28). Bumble-Extraction: Bumble Parsing Script 2021. Available online: https:\/\/doi.org\/10.5281\/zenodo.5805024."}],"container-title":["Forensic Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2673-6756\/2\/1\/16\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T22:28:58Z","timestamp":1760135338000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2673-6756\/2\/1\/16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,27]]},"references-count":29,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2022,3]]}},"alternative-id":["forensicsci2010016"],"URL":"https:\/\/doi.org\/10.3390\/forensicsci2010016","relation":{},"ISSN":["2673-6756"],"issn-type":[{"value":"2673-6756","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,2,27]]}}}