Indeed, the conversation went by the script, and in the end Raz received an invitation to continue the chat in Skype with juicyyy768.The account name reminded him of the bot that invited him to Skype when he was in Denver — the name followed the same formula: a word with the last letters repeated several times and three digits at the end.They turned out to be combinations of stolen identities: There were links to Facebook and Instagram accounts that didn’t match the names and pictures in the Tinder profiles.
The websites’ names were related to sex, or Tinder, or something along those lines.One of them sent him a message in Danish, with a link in the end.A lot of more matches followed, and a lot of messages too.The next step was tracking the infrastructure of the bot empire.Raz checked the IP address of one of the websites he had received a link to in his early chats with Tinder bots.Some of the matches in Denver were more advanced chat bots — they didn’t sent a fishy link immediately; they tried chatting first.Raz asked them intricate questions to probe how interactive these chat bots really were.Raz started to check the registration info for these domains, but most of the domains had been registered anonymously.However, checking all 61 domains yielded a bit more information.What do you suppose the click-through rate is for links received by men in dating app messages from attractive women? This subject is surprisingly well researched — I’m talking researched. Two out of three men actually click on these links, which makes it without doubt the best conversion rate in the world. Inbar Raz started his research with building the perfect Tinder profile.