Přečtěte si další informace, mimo jiné i to, jaké máte možnosti: zásady používání souborů cookie.Digital technology and smartphones in particular have transformed many aspects of our society, including how people seek out and establish romantic relationships.If the software hasn't already identified the IP Address of the new profile as one that is often trouble, the operator may perform additional look ups.Using online tools we can determine if the person posted the profile using a computer located in a part of the world other than where the person claims to reside.That is why we have made public our database of fake profiles and scammers.
On our Cyber Dating websites we are constantly on the lookout for fake profiles and the methods we use are both manually done and with automatic software.
The software does things like searching for words and phrases often used by scammers.
It looks for the IP addresses and email addresses of known scammers and it looks for fields that are filled in with silly or repeated information. It may be flagged as suspect and then all of the profiles are sent to a human operator for the next steps in the process.
Through both manual and automatic detection methods, we actively scan each new profile and if it seems fishy, we ban it and post it here.
Since no dating blacklist system is perfect, we do miss some of the fake profiles that are posted.
The operator may also compare the profile with our database of fake profiles looking for similar ones.