In this article, we will learn out how to bypass and get a tinder premium for free. Before I start I would like to warn that you have to use this method at your own risk.
So, are you ready? What we are going to do is make use of a vulnerability in tinder API that will let us bypass the free account limitations and use tinder premium for free. While tinder is fully aware of this bug and several people have reported it to them, tinder team has chosen to ignore it.
Maybe this is how their API works and making any changes to it can mess up their app. Whatever the reason, it can be exciting to use free tinder gold services without actually having to pay for it.
Tinder is a dating app that makes matches based on likes. When a person likes your profile he/she will swipe your profile right for which you will get a like.
And when you swipe that profile right it means that you are a match. Now the problem is that unless you are a tinder gold user you cannot see who has liked your profile and all you can see is their blurred photo.
And if you want to see who’s behind the blurred photo you need to buy tinder gold subscription. That’s a pretty sneaky tactic to get users to buy their premium service.
The good news is that tinder blurs the photos on the application side and not on the server-side. Behind the blurred photo, you will still have a full photo waiting to be revealed.
To unblur the photos and make matches just like tinder premium you need to do a bit of work and reverse engineer their API.
There are a few request headers that are required for this. This is easy to obtain so you don’t have to worry much. First, you need to login to your tinder account through a browser.
Once logged in you to open the developer console. You can open this by right clicking the page and selecting Inspect or Inspect Element based on the browser you have selected.
Alternatively, you can also use the shortcut Ctrl + Shift + I to access developer tools. Once you are in the developer console click on the Network tab.
Next, you will have to make an endpoint request to get the blurred photo. For this, you need to make use of a service called Postman to make requests to the endpoint. Visit the below URL and create an account.
Once you have logged in, make an endpoint request edarling to get the following result where you will find your desired photo.
The important parameter here is the X-Auth-Token that should be updated weekly or whenever it fails. And in such cases just make a request again and you are good to go. Now that you know how to access the photo let’s take a look at the tinder like system.
Tinder follows a queue or First In First Out (FIFO) for their like system. What this means is that if you want to see the photo of the person who liked your profile you need to match to the person who is in the first of the queue. And this photo is the response image that you downloaded from the previous method.
All you have to do is compare the photo with the blurred image and swipe them right if you like them. But wait, there’s more. The profile recommendations that you get in tinder uses a circular queue.
It means that even the recommendations rejected by you will show up again in your account until a new profile is added which is usually 24 hours or until you change your location.
You also get a profile boost from tinder when you travel to a different city or state which will increase the number of likes that you will get. The above endpoint fetching method will only fetch the image and user id of the most recent suggestion. Going through the same process as above and fetching every photo can be time-consuming. By using the above method the endpoint request will fetch response like below:
If you are good at a bit of programming you can automate the process by using a tool like OpenCV. All you need are the request headers from the above step to make GET requests.
I hope you find your perfect match on tinder that you have always wished for. Good luck and happy swiping.
About the Author