10 creepy iPhone, iPad apps and software

10 creepy iPhone, iPad apps and software

Summary: There is some seriously creepy software floating around on the Internet for iPad, iPhone, Android and PC.

SHARE:

 |  Image 6 of 10

  • Thumbnail 1
  • Thumbnail 2
  • Thumbnail 3
  • Thumbnail 4
  • Thumbnail 5
  • Thumbnail 6
  • Thumbnail 7
  • Thumbnail 8
  • Thumbnail 9
  • Thumbnail 10
  • For the guy or girl pining after their crush, or perhaps someone who wants to become a shoulder to cry on in the hope of converting that into a a rebound roll in the hay, the Breakup Notifier is a tool of choice.

    You visit the site, and log in to Facebook. After choosing the friends you want to recieve relationship notifications for, you will get an email every time a change is submitted.

    The app checks these statuses every ten minutes, so you can be quick off the mark to anything you'd like to twist to your advantage. 

    Image credit: Breakup Notifier

  • Tigertext is an app that can be used to keep tab on multiple special friends -- and hide any evidence of your activities.

    Sending a cheeky late-night text, or asking someone else if they want to 'come around and watch a film'? Fear not, your textual activities can be automatically blown up without a trace.

    Apparently, the message is not only deleted from your phone, but also the service provider's server.. and the receivers' phone. Therefore, the only way that texts can be held against you in the future are if pictures are taken of the messages.

     

    Image credit: Apple App store

  • Aptly named, desktop application Creepy is software that calls itself a 'geolocation information aggregator'.

    After downloading and installing the open-source software, you can stalk a user via Twitter and Flickr accounts. 

    If the user has posted any location data, then the software tracks it -- helping you to pin them down. I was surprised at just how data can be aggregated from seemingly innocuous updates -- although as it compiles and analyzes a lot of data, it can take a few attempts before Twitter accounts are connected successfully. 

    • Map providers : Google Maps, Virtual Maps, Open Street Maps. 
    • Location information retrieval from :
    • Twitter's tweet location
    • Coordinates when tweet was posted from mobile device
    • Place (geographical name) derived from users ip when posting on twitter's web interface.
    • Geolocation information accessible through image hosting services API EXIF tags from the photos posted.

    Image credit: Creepy

Topics: Smartphones, Apps, Software, Mobility, iPad, iPhone, Hardware, CXO, Browser, IT Employment

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.

Related Stories

Talkback

4 comments
Log in or register to join the discussion
  • unfortunate headline typo

    "Fist date go well?"

    Assault, or foreplay?
    alegh
  • How Did Apple Aprove these?

    Given Apples "self proclaimed" strict security and ethical guide lines, I'm amazed they got approved. Is Apple asleep? I wouldn't be surprised if they are ridden with malware. Any app that you use to spy on someone else also spy's on you.
    Apelles
  • I'm gonna cry 'foul'...

    "Creepy" (#7) is a Windows app, NOT an iOS app!!!!
    sheepguy42
  • Recommend another dating app

    I would like to recommend one more dating apps, with casual games. Chat, flirt, date and meet girls & guys nearby! Hey Gal - https://play.google.com/store/apps/details?id=com.havefun.fun
    havefunstudio