Будьте внимательны! Это приведет к удалению страницы «Static Analysis of The DeepSeek Android App»
.
I carried out a static analysis of DeepSeek, a Chinese LLM chatbot, utilizing version 1.8.0 from the Google Play Store. The goal was to determine possible security and privacy concerns.
I've blogged about DeepSeek previously here.
Additional security and personal privacy issues about DeepSeek have been raised.
See likewise this analysis by NowSecure of the iPhone variation of DeepSeek
The findings detailed in this report are based simply on static analysis. This indicates that while the code exists within the app, there is no conclusive proof that all of it is executed in practice. Nonetheless, the existence of such code warrants scrutiny, especially offered the growing concerns around information privacy, monitoring, the possible abuse of AI-driven applications, and cyber-espionage characteristics between worldwide powers.
Key Findings
Suspicious Data Handling & Exfiltration
- Hardcoded URLs direct data to external servers, raising issues about user activity monitoring, such as to ByteDance "volce.com" endpoints. NowSecure recognizes these in the iPhone app the other day too.
- Bespoke file encryption and data obfuscation methods are present, with that they could be used to exfiltrate user details.
Будьте внимательны! Это приведет к удалению страницы «Static Analysis of The DeepSeek Android App»
.