Yik Yak revived messaging app was meant to restore the days of anonymous local chat but may have made it easier for hackers. Computer science student David Teather informed Motherboard that Yik Yak had a flaw that let attackers obtain both the precise location for posts (within 10 to 15 feet) and users’ unique IDs. Combining these two pieces of information allows you to track user movements.
Teather used proxy tools to determine that YikYak had sent every message with both the exact GPS location and user ID. This was despite users seeing only vague distances and city identifiers. An independent researcher verified the findings for Motherboard, although it’s not clear if anyone has exploited the flaw so far.
Yik Yok has not responded to any requests for comment. The developer released three updates betw