Guide9 min read2,057 words

What Happens to Your Face Data on Dating Apps

Anika Desai — Digital Privacy Researcher & Tech Journalist

By Anika Desai

Digital Privacy Researcher & Tech Journalist · M.Sc. Cybersecurity, Georgia Tech

The first time you upload a selfie to a dating app, something happens that the consent flow doesn't quite explain. Your photo isn't just stored as a JPEG. It's analysed. A face detection model finds the boundary of your face. A second model extracts what's called an "embedding" — a long string of numbers that mathematically represents your unique facial features. That embedding is stored, indexed, and in many cases passed to one or more third parties. None of this is hypothetical. All of it is documented in the privacy policies of the largest dating platforms operating in India today.

When I analysed the privacy disclosures of 18 dating apps available in India in late 2025, I found that 14 of them performed some kind of facial analysis on user photos. Only 6 disclosed this clearly in their first-screen consent flow. The rest buried it in privacy policy section 7.2 or later.

This is what actually happens to your face data once it leaves your phone. And — because the answer is rarely reassuring — what you can do about it.

The Three Categories of Face Data

Not all face data is the same. The distinction matters because the legal protections, retention periods, and third-party sharing rules are different for each category.

Category 1: Raw photos. The image file itself, complete with EXIF metadata. Stored in cloud buckets, served via CDN. This is what most users imagine when they think of "uploading a photo."

Category 2: Face detection metadata. Coordinates of the face within the image, plus attributes like estimated age, gender, ethnicity, and emotion. Generated by services like Amazon Rekognition or Google Cloud Vision. Stored as structured data — usually in a database row tied to your user ID.

Category 3: Biometric embeddings. A mathematical fingerprint of your face. Typically a vector of 128 to 512 floating-point numbers that uniquely identifies you across photos, even if your appearance changes. This is the most sensitive category because it can be used for cross-platform identification.

The third category is the one that should worry you most. Once an embedding exists, your face has been converted into a template that can be matched against any other photo of you, anywhere — including ones you didn't upload to that app.

The Verification Pretext

Most dating apps that perform face matching frame it as a safety feature. "Verify your photo is really you" is the standard pitch. The user takes a real-time selfie, the app compares it to their profile photos, and a green checkmark appears on the profile.

The pitch is true, as far as it goes. Face verification does reduce catfishing — by some measures, by as much as 28% on platforms that adopted it between 2019 and 2023. The Mozilla Foundation's Privacy Not Included 2024 report acknowledged this benefit.

But the pitch is incomplete. The verification process generates and stores a biometric template. That template is rarely deleted after verification. It sits in a database, indexed by user ID, available for any future matching, sharing, or processing the company decides is consistent with its terms of service. And the terms of service are written to permit a great deal.

A 2023 survey by the Electronic Frontier Foundation found that 72% of dating apps that performed face verification retained the biometric template indefinitely, even after a user deleted their account. Only 4 of the 25 apps reviewed offered a clear, single-click way to delete the template separately from the account.

"Biometric data is uniquely sensitive because you cannot change your face the way you can change a password. Once it's leaked, it's leaked forever." — Eva Galperin, Director of Cybersecurity, Electronic Frontier Foundation

Where Your Face Actually Goes

When you upload a photo to a dating app, here's the typical journey it takes — based on documented infrastructure of the major platforms:

  1. Upload to S3 or equivalent. The image lands in cloud storage. AWS S3, Google Cloud Storage, and Cloudflare R2 are the dominant providers.
  2. CDN distribution. The image is replicated to edge servers around the world so other users see it quickly. This means copies exist on dozens of servers, each with its own access logs.
  3. Face detection. The image is sent to a face detection service. Amazon Rekognition is the most common; some larger apps run their own models.
  4. Embedding generation. A separate model converts your face into a biometric template. This is often a different vendor than the detection service.
  5. Attribute analysis. Optional services may estimate age, ethnicity, mood, or "attractiveness scores." Yes, this happens. A 2022 ProPublica investigation documented several apps using attractiveness scoring to influence which users see whom.
  6. Storage. The embedding, attributes, and a reference to the original image are stored in the app's primary database.
  7. Third-party sharing. Depending on the app's terms, this data may be shared with advertising partners, analytics vendors, or "trust and safety" platforms that maintain cross-app risk databases.

That last step is the one most users never imagine. Cross-platform face databases exist. They are sold as fraud prevention tools to dating apps, fintech apps, and KYC providers. Once your face is in one, it's in all.

The Indian Context: DPDPA and Aadhaar Anxiety

India's DPDPA 2023 classifies biometric data as "sensitive personal data" and theoretically requires explicit, separate consent for its processing. In practice, the rules are still being interpreted, and enforcement has been minimal. The Data Protection Board, established under the Act, only began issuing notices in mid-2025.

There is also a specific Indian anxiety that doesn't exist in the same way elsewhere: the proximity between dating app face data and Aadhaar-linked identity systems. While no major dating app currently links face data to Aadhaar directly, the same vendors who process Aadhaar e-KYC (IDfy, Digio, HyperVerge) also process face verification for several Indian dating apps. The infrastructure overlap is real, even if the data sets are nominally separate.

A 2024 NCRB report noted that biometric data leaks accounted for 12% of all reported "high-severity" cyber incidents in India that year. The share is small but rising. Once a face template leaks, there is no remediation. You cannot revoke a face.

Your face is the hardest thing to take back once it is out there — here is why gender symmetry matters:

What the Big Apps Disclose (And What They Don't)

I'll spare you the brand names, partly to avoid lawsuits and partly because the patterns are similar across the major platforms. Here's the consolidated picture from my 2025 review of 18 dating apps available in India:

  • 14 of 18 perform some form of face detection on uploaded photos.
  • 9 of 18 generate biometric embeddings or templates.
  • 6 of 18 share face-derived data with at least one third-party service.
  • 4 of 18 disclose the third-party sharing in their first-screen consent flow.
  • 3 of 18 offer a self-service way to delete the biometric template separately from the account.
  • 0 of 18 notify users when their face is matched against an external database.

These numbers should be the headline of every dating app review. They almost never are.

What You Can Actually Do

Face data is harder to protect than other categories of personal data because the moment you upload one identifiable photo, you've handed over the raw material. Here's what's actually within your control.

Strip metadata before uploading. EXIF metadata can include GPS, camera model, and timestamps. Use a tool like ImageOptim or ExifTool to remove it. This won't hide your face but it removes the second layer of leakage.

Use photos that aren't on your other social accounts. Reverse image search is the most common way someone identifies a dating app user. If your dating app photo doesn't appear on Instagram, LinkedIn, or your office website, the cross-platform identification chain breaks.

Read the privacy policy section on biometric data. It's usually section 6, 7, or 8. Look for the words "facial recognition," "biometric," "face template," or "embedding." If those terms aren't there but the app does face verification, the disclosure is incomplete and you should treat it as a yellow flag.

Request deletion under DPDPA. Indian users have the right to request deletion of personal data. Email the app's grievance officer (every app operating in India must have one listed). Explicitly request deletion of all biometric data, not just account closure.

Choose apps that minimise face data collection. Privacy-first platforms like Hidnn are designed around the assumption that face data is sensitive and should be exposed only when the user chooses, not as a default condition of using the app. Look for the words "data minimisation" in the privacy policy, not just "secure."

FAQ

Q: Can a dating app sell my face data to advertisers? A: In most jurisdictions, including India under the DPDPA, this requires explicit consent. In practice, "consent" is often buried in a 40-page terms document. Some apps share face-derived attributes (age range, estimated mood) with ad networks even if they don't share the raw embedding.

Q: If I delete my account, is my face data deleted? A: Often no. Many apps retain biometric templates indefinitely "for fraud prevention." Under DPDPA, you have the right to request deletion of all data, including biometric. You may need to ask explicitly.

Q: Does face verification protect me from catfishing? A: Partially. It reduces but doesn't eliminate catfishing. The trade-off is that the protection comes at the cost of generating and storing a biometric template indefinitely.

Q: Can someone identify me from my dating app photo using a public face search engine? A: Yes. PimEyes, FaceCheck.ID, and similar services can match a dating app photo to other instances of your face online. This is one of the most common ways stalkers identify dating app users.

Q: Is Hidnn different in how it handles face data? A: Yes. Hidnn is built on the principle that anonymity is the user's right. Face data is treated as a separate, opt-in concept rather than a default upload. The user controls when and to whom their face is revealed.

What This Means for You

Your face is not just an image. It's a key. Once you've handed over a copy of that key, you can't take it back. Every dating app you've ever uploaded a photo to has, at minimum, a record of your face. Most of them have something more — a template, an embedding, a fingerprint that can find you in any other photo.

You don't have to stop using dating apps. You do have to start treating your face as the sensitive credential it is. Choose platforms that respect that. Strip metadata before upload. Use distinct photos. Request deletions. And remember that the green checkmark next to a verified profile is also a record in someone else's database.

Share this article

Back to all posts