This tool and guide are for informational and educational purposes only. We are demonstrating how perceptual hashes and device tracking work. We do not endorse or condone the violation of any platform's Terms of Service. You are solely responsible for your actions, and using this information to circumvent a platform's rules may result in a permanent ban. Use at your own risk.
Guide to resets and unbans on Dating apps
Privacy-first image processing • All operations happen locally in your browser
Dating apps store 64 bit hashes of images that are used on the apps. This uses a complicated algorithm of changes to modify the difference hash without ruining the image.
They are allowed to keep an "anonymized" hash of every picture even after a complete data wipe. Thus, you need new pictures or to use this tool.
Image Hash Modifier Tool
Original
Sanitised
Pick an image…
How does this tool work?
This tool uses advanced image processing techniques to modify your photo in subtle ways that change its perceptual hash while maintaining natural appearance:
Targeted bit-flipping at 8×8 resolution for dHash modification
Contrast enhancement and highlight amplification
Spatial clustering and feathered radial transitions
Global noise injection for comprehensive hash changes
Perceptual optimization to maintain natural appearance
Δ (Delta) Values:
Δ < 3: Apps may still detect as the same image
Δ = 3-8: Good for most bypass attempts
Δ > 8: Very difficult for apps to detect as duplicates
*Note: Results may vary slightly depending on the original image characteristics and content.
Privacy Bonus: All EXIF metadata (including GPS location, camera info, timestamps, etc.) is completely stripped from the processed image for maximum privacy protection.
I asked Gemini to fact check:
Yes. This is a well-known and confirmed practice.
Standard Implementation
Perceptual hashes (like dHash and pHash) are the primary, first-line-of-defense for services like Tinder, Hinge (both owned by Match Group), and OkCupid to automatically detect and block previously-banned content.
Implementation Purpose
They use it specifically to catch users who try to get around a ban by creating a new account with the same photos. If they only checked for exact file matches (a cryptographic hash), you could bypass the ban by simply:
Changing the filename
Cropping the image by one pixel
Slightly changing the brightness
Taking a screenshot of the photo
Technical Operation
A perceptual hash defeats all those simple tricks. When you're banned, they store the pHash/dHash of your photos. When any new user uploads a photo, the app generates a hash and compares it against its "banned" database. If it finds a match (or a very close match), the new account is automatically flagged or banned.
The list of changes shows the creator understands how these hashes work:
Targeted bit-flipping at 8x8 resolution for dHash modification
This is the most telling detail. The dHash (difference hash) algorithm specifically works by comparing the brightness of adjacent pixels in a small, 8x8 version of the image. This method claims to target those exact comparisons to "flip" the bits in the resulting hash.
Luminance manipulation and contrast enhancement
Both dHash and pHash are highly sensitive to changes in relative luminance and contrast. By subtly manipulating these, the tool can drastically change the resulting hash.
Spatial clustering and feathered transitions
These terms describe how the tool hides these changes from the human eye. It's making the modifications look like natural lighting or lens effects rather than a blocky, digital mess.
In summary, the tool appears to be a well-informed adversarial attack against perceptual hashing algorithms. It makes the minimal number of targeted, subtle visual changes required to break the hash, while preserving the photo's quality.
More than enough. A distance of 20-32 isn't just "enough," it's massive overkill.
Understanding Hamming Distance
Hamming Distance = The number of bits that are different between two hashes.
Distance of 0 = The images are identical
Distance of 1-5 = The images are almost identical (e.g., a screenshot, slightly brighter). This is what apps look for to flag duplicates
Distance of 10 = The images are still visibly similar, but noticeably different
Distance of 20-32+ = On a 64-bit hash, this means 30% to 50% of the entire "fingerprint" is different. The system would conclude the images are completely unrelated, like a photo of you versus a photo of a car
This tool's goal is to make changes that result in a new hash with a high Hamming distance (20-32+), which would make the app's system see it as a completely new and unrelated photograph.
How to do a hard reset for Tinder
Dating apps like Tinder, Bumble, or Hinge sometimes require a complete restart. Dating apps are frustrating. Whether you have "profile issues", suspect you're getting zero likes (despite previous success), or feel your profile's performance has plummeted beyond recovery, this guide will help you wipe the slate clean and start fresh.
If you're just looking to refresh your profile without serious issues, a simple soft reset might work. But for more serious problems, follow this comprehensive guide.
Step 1: Delete Your Existing Account
First, you need to properly remove your old profile:
Open your dating app and tap your profile picture in the top left
Access the settings menu (usually a gear icon)
Scroll down to find "Delete Account" option
Confirm the deletion
Uninstall the app from your phone
Note: Sometimes you might not be able to delete your account normally. In this case, proceed to the next step.
Step 2: Request Complete Data Deletion
Simply deactivating your account doesn't actually remove your data from the company's servers.
Send an official data deletion request to the app's privacy email (e.g., [email protected])
Use this template:
Subject: GDPR Data Deletion Request
"To Whom It May Concern:
I request the complete deletion of all my personal data under GDPR Article 17.
Account details:
Name: [Your Name]
Email: [Email used for Tinder]
Phone: [Phone number used for Tinder]
Please delete ALL data associated with my account.
Please confirm.
Regards,
[Your Name]
"
Wait for confirmation (can take up to a month)
Step 3: Clear All App Data
This step helps remove local traces of the app:
Android users: Go to Settings > Apps > [Dating App] > Storage > Clear data and cache
iPhone users: Unfortunately, Apple doesn't offer deep cleaning options. Uninstalling is your only option.
Step 4: Using a New Phone
Dating apps are increasingly sophisticated at tracking users across re installs:
If possible, use a different phone for your new account
Find that old iPhone that you don't use anymore
Consider an inexpensive second-hand phone ($30-40 on marketplaces)
If buying a new iPhone, create a new Apple ID too
You can use the phone on hotspot/WiFi without a SIM card if necessary
Too hard? You can make a new account in the browser but this increases your risk score and will result in you getting banned easier.
IMPORTANT: Never log into your new account from a device that was used with your old, deleted profile.
Step 5: Get a New Phone Number & Email
This is perhaps the most crucial step of the reset process:
New Phone Number Options:
Purchase a prepaid SIM card
Try number apps verification apps like TextNow, smspool or Burner
Use a verification service (usually under $5)
New Email:
Create a fresh Gmail account from your new device
Don't import contacts or connect to your other accounts
Use this email exclusively for dating apps
For extra security, use your new phone number for initial verification, then switch to email verification for future logins.
Step 6: Your Photos
Dating apps use image recognition to detect reused photos:
Use completely different photos than your previous account
Or modify your old photos using the image editing tool above to change their digital signature
Step 7: Use a Different Network
Your IP address can be used to track you:
Use mobile data instead of your home WiFi that you used on your previous account.
Try a public WiFi hotspot or a friend's network
Avoid VPNs as they can trigger suspicion flags
You can likely return to your regular network once the account is established
Step 8: Create Your New Account
Now you're ready to start fresh:
Use your new phone number and email
Avoid social logins (Facebook, etc.)
Wait at least 3 days after sending deletion requests
Don't link old Instagram/Spotify accounts
Use a different payment method for premium services
Avoid face verification if possible
Use the new modified pictures.
Step 9: Use Your New Account Wisely
To avoid future profile issues:
They are more likely to ban low "elo" profiles. Get afacial analysis and find out how to become more attractive and what your best images are.
Be selective with your first 20 swipes to establish your "standards"
Don't purchase long-term subscriptions – stick to monthly plans
Avoid swiping right on everyone – the algorithm penalizes this behavior.
Wanna find out how attractive you are from 1-10?
Lookrank uses AI to rate your facial attractiveness and help you optimize your dating photos privately.
When you travel out of the country it's a great opportunity to create a new account.
You will most likely have a new SIM, use it!
Different regions have different data laws. Thus your old account details might not exist in this regions data center.
You're in a different location and have a different IP. This lowers your fingerprint.
For Canadian users
Since your data laws allow them to keep a face id of you indefinitely you need to use the travel method. Sorry, there's no other way.
Final Notes
The more steps you follow, the lower your risk score will be. While some users might get lucky skipping steps, creating a completely new digital fingerprint gives you the best chance of success.