Is someone checking your browsing?
This website will appear in your browser history. If you're concerned someone may be monitoring your internet use, consider using a trusted friend's device, a library computer, or your browser's private/incognito mode. You can press Quick Exit or hit Escape at any time to leave this site quickly.
Learn more about staying safe online
Someone uses dating apps to find people they can exploit — looking for signs of vulnerability in profiles and conversations.
What You Might Notice
They move very fast emotionally
Intense declarations of feelings within days. This pace is designed to overwhelm your judgement.
They want to move off the dating app quickly
Pushing to WhatsApp, Telegram, or phone calls before you're comfortable removes the platform's safety features.
What You Can Do
Keep conversations on the platform initially
Dating apps have reporting and blocking features. Moving to private messaging removes those protections.
Do a reverse image search on their photos
Scammers often use stolen photos. A reverse image search can reveal if the photos belong to someone else.
Important: This resource provides general information, not personal advice. Every situation is different. The actions suggested here may not be safe in your specific circumstances — particularly if the person causing harm could notice changes to your devices or accounts. Always consider your physical safety first.
If you need personalised support, contact 1800RESPECT (1800 737 732) or your local specialist domestic violence service. If you are in immediate danger, call 000.
Using dating apps (Tinder, Bumble, Hinge, Grindr) to identify targets, often filtering for vulnerability signals in profiles such as recently single status, mentions of loneliness, or indicators of financial situation.
Mitigations for this technique are under development. If you have suggestions on how to improve this content, please submit a pattern.
The TFA Matrix is a research framework under active development. Technique classifications, detection methods, and mitigations reflect current understanding and are subject to revision. This framework does not constitute forensic methodology, legal evidence standards, or clinical diagnostic criteria. Practitioners should apply professional judgement appropriate to their discipline and jurisdiction.