Fake dating photo sagittarius woman dating a taurus man

Every profile is summarized on a screen where a human operator looks it over.

If the software used in the first step found any issues, the suspicious information is highlighted in red for the operator to review.

Put on your battle gear because dating has become a minefield strewn with fakes ready to blow up in your face …

they’ll tell you everything you want to hear, but at a price.

We can also see if the person used a proxy service to hide his/her location. Usually the last thing we do is to check for duplicates of either the profile text or the photo on other websites.

We may use search engines like Google to do this or other Anti-Scam websites.

Of course we use our own database of profiles extensively for this purpose.

If you would like some background information about online scammers work, read our article: How an Internet dating scam works.

fake dating photo-59fake dating photo-56

Scammers are usually lazy and when they need to post a profile to gain access to an online dating site, they'll just copy and paste an ad from another dating Website.

If the software hasn't already identified the IP Address of the new profile as one that is often trouble, the operator may perform additional look ups.

Using online tools we can determine if the person posted the profile using a computer located in a part of the world other than where the person claims to reside.

If you see a questionable profile on Cyber Dating, you can search our database to see if someone else has used the same text or photo in a previous dating scam.

On our Cyber Dating websites we are constantly on the lookout for fake profiles and the methods we use are both manually done and with automatic software.

Leave a Reply