Lovora Data Breach
Gravity Score
ModerateCalculated based on the types of data exposed (3 categories) and the volume of affected records (495,556).
Relationship and couples apps often hold highly personal signals about someone’s private life, even when the content looks simple on the surface. When that kind of data is exposed, it can be used to connect identities, profiles, and real people in ways users never intended.
Lovora was reportedly involved in a breach where user information was exposed outside the app. Reports also noted that the developer, Plantake, did not reply to repeated attempts to reach them about the incident.
The leaked dataset included email addresses, display names, and profile photos. While it did not mention passwords, these details can still enable targeted contact, unwanted exposure, and the linking of a profile image to an inbox.
Roughly 496 thousand unique email addresses were impacted. With profile photos and display names included, the breach could make it easier for others to identify users and misuse that context in social situations or online harassment.
Exposed data
What to do based on this breach
What can we learn from this breach?
This incident shows how basic profile fields like photos and display names become sensitive when tied to an email address. Strong security comes from collecting only what is needed, securing stored data, and monitoring access responsibly. Clear, timely communication after an incident is also a key part of good privacy practice under GDPR expectations.
Was your data exposed?
Check now if your email appears in this breach. It's free, takes 30 seconds and requires no signup.
Check my email