Women's Safety App Tea Suffers Massive Data Breach, Users' IDs Exposed on 4chan

Women's Safety App Tea Suffers Massive Data Breach, Users' IDs Exposed on 4chan

Privacy Nightmare Hits Viral Dating Safety Platform

The women-only dating safety app Tea, which rocketed to the top of Apple's App Store charts this week, has suffered a catastrophic data breach that exposed tens of thousands of users' driver's licenses, selfies, and personal verification photos to users on the anonymous messaging board 4chan.

What is Tea?

Tea is a controversial app designed exclusively for women to anonymously share experiences and warnings about men they've dated. The platform requires strict identity verification—users must upload both a selfie and a government-issued ID to prove they are women before gaining access to the community.

The app's premise is simple but polarizing: women can search for men by photo and location, then view anonymous reviews and "red flags" or "green flags" posted by other users who have dated them. Think of it as a combination of Yelp and a background check service, but for romantic partners.

The Security Disaster

On July 25, 2025, users on 4chan discovered that Tea's entire user database was stored in a completely unsecured Google Firebase storage bucket. No password, no authentication, no security measures whatsoever—just a public URL that anyone could access.

"Yes, if you sent Tea App your face and drivers license, they doxxed you publicly! No authentication, no nothing. It's a public bucket," read one 4chan post that included the vulnerable database link.

The thread, which has since been deleted, contained messages like "DRIVERS LICENSES AND FACE PICS! GET THE F*** IN HERE BEFORE THEY SHUT IT DOWN!" as users scrambled to download as much personal data as possible.

Scale of the Breach

The exposed data included:

  • 72,000+ user verification photos including selfies and driver's licenses
  • Personal identification documents with full names, addresses, and dates of birth
  • Some direct messages between users
  • Location data tied to user profiles

4chan users created automated scripts to mass-download the exposed files, with some claiming to have collected thousands of women's personal documents within hours of the discovery.

Company Response Falls Short

Tea's response to the breach has been inadequate and contradictory. The company initially claimed the exposed data was "from more than two years ago" and that "no current user data is affected."

This explanation raises serious questions, as the app only went viral and gained massive popularity this week. If the data is truly two years old, why was it still accessible? And why were recent users' verification photos apparently included in the leak?

The company's founder, Sean Cook, has not responded to media requests for comment, leaving users in the dark about the full scope of the breach and what steps are being taken to protect them.

The Bigger Picture

This breach highlights the dangerous intersection of good intentions and poor execution. Tea's mission—helping women stay safe while dating—is admirable and addresses a real need. However, the app's complete failure to secure users' most sensitive personal information has potentially put thousands of women at greater risk.

The irony is stark: an app designed to protect women's safety has become a tool that could facilitate stalking, harassment, or identity theft. The very women who trusted Tea with their most personal information to stay safe while dating now face the possibility of being doxxed by anonymous internet users.

What Users Should Do

If you've used the Tea app:

  1. Monitor your identity - Watch for signs of identity theft or unauthorized use of your personal information
  2. Consider a credit freeze - Protect yourself from potential financial fraud
  3. Document everything - Keep records of your Tea account and any suspicious activity
  4. Report incidents - Contact authorities if you experience harassment or stalking that may be linked to the breach

The Cost of Poor Security

This incident serves as a cautionary tale about the importance of cybersecurity, especially for apps handling sensitive personal data. Tea's decision to store unencrypted user verification documents in a public, unsecured database represents a fundamental failure of basic security practices.

For an app built around safety and trust, this breach may prove fatal to both its reputation and its mission. The women who needed Tea's protection the most are now the ones most at risk from its catastrophic security failures.

Tea's Competitors: How Do They Stack Up on Security?

The Tea app breach highlights a critical gap in the women's dating safety space. Here's how Tea's main competitors handle security and user protection:

Are We Dating The Same Guy (AWDTSG) Facebook Groups

The original inspiration for Tea came from the "Are We Dating The Same Guy?" Facebook groups, which have over 3.5 million members across 200+ individual groups worldwide. Unlike Tea's centralized app approach, AWDTSG operates through private Facebook groups where women share dating profiles and experiences.

Security differences:

  • No identity verification required - Users only need a Facebook account
  • Screenshots allowed - Unlike Tea's anti-screenshot technology, Facebook groups can't prevent image sharing
  • Platform liability - Facebook's infrastructure handles data security, rather than a startup's potentially vulnerable systems
  • Legal challenges - Multiple defamation lawsuits have been filed against AWDTSG groups, with one man in Los Angeles suing for $2.6 million

Noonlight: America's #1 Safety App

Noonlight protects over 3 million users and is America's number one safety app, with integrated compatibility with Tinder and other major dating platforms. Unlike Tea's community-driven approach, Noonlight focuses on emergency response.

Key features:

  • Emergency button technology - Users hold a button when feeling unsafe; releasing without entering a code alerts police
  • Professional monitoring - 24/7 help centers with trained operators screen calls and connect users with appropriate emergency services
  • Major platform integration - Match Group invested in Noonlight in 2020, integrating it across Tinder, Match, OkCupid, and other dating apps
  • No personal review system - Focuses purely on emergency response rather than crowdsourced information sharing

Other Dating Safety Apps

Kitestring: A text-based check-in service that doesn't require app downloads - users set timers and receive SMS check-ins, with emergency contacts alerted if they don't respond

Arlo Safe: Professional security monitoring with live, medically trained experts available 24/7

bSafe: Voice activation and live streaming capabilities for emergency situations

The Security Comparison

What makes Tea's breach particularly damaging is how it contrasts with its competitors:

  1. AWDTSG groups rely on Facebook's established infrastructure rather than building their own vulnerable systems
  2. Noonlight partners with major tech companies like Match Group, likely ensuring enterprise-level security standards
  3. Traditional safety apps focus on emergency response rather than storing sensitive identity documents

Tea's approach of requiring driver's licenses and ID verification created a honeypot of sensitive personal data that proved irresistible to malicious actors. In contrast, most competitors either avoid collecting such sensitive information or rely on established platforms with proven security track records.

The lesson is clear: good intentions in women's safety technology mean nothing without proper cybersecurity infrastructure to protect the very users you're trying to help.

This story is developing as more details about the breach continue to emerge.

Read more