Recently, everyone has been talking about the Tea app data breach incident. Thousands of images of women were leaked, along with their IP addresses—a major concern since IPs can be linked directly to locations.
All this happened while the company was claiming to be completely safe for women. According to the Tea website, the app was designed so that only women could sign up, verify themselves via driving licenses or selfies, and then help other women avoid “red-flag” men.
Tea is an aromatic beverage prepared by pouring hot or boiling water over cured or fresh leaves of Camellia sinensis... — Wikipedia
Just kidding.
The Tea we’re talking about is the Tea dating app, which claimed to provide dating safety tools that protect women.
Instead of names, users were assigned random usernames to anonymously call out men on the app. In theory, it worked as a digital shield against creepy or scammy people online.
This was a good initiative—until user data ended up publicly exposed on 4chan, including verification selfies (faces alongside government IDs), which the company claimed were deleted after verification.
The Tea app breach happened in two phases:
This meant attackers could directly identify user locations—an alarming risk for women.
If your app’s USP is anonymity and safety, security should be your first priority. Tea failed here.
After the incident, the company issued a notice claiming only users signing up after Jan 2024 were affected. Why? Because they had migrated their database to Firebase.
.js
bundles, researchers found many Firebase collections with public read access.Tea made things worse:
The Tea app failed due to several security misconfigurations combined with Firebase’s weaknesses: