Будьте внимательны! Это приведет к удалению страницы «Static Analysis of The DeepSeek Android App»
.
I conducted a fixed analysis of DeepSeek, a Chinese LLM chatbot, using version 1.8.0 from the Google Play Store. The objective was to recognize prospective security and personal privacy problems.
I've composed about DeepSeek formerly here.
Additional security and personal privacy issues about DeepSeek have actually been raised.
See likewise this analysis by NowSecure of the iPhone version of DeepSeek
The findings detailed in this report are based simply on fixed analysis. This implies that while the code exists within the app, historydb.date there is no definitive evidence that all of it is executed in practice. Nonetheless, the existence of such code warrants scrutiny, especially offered the growing concerns around information personal privacy, monitoring, the possible abuse of AI-driven applications, and cyber-espionage dynamics between international powers.
Key Findings
Suspicious Data Handling & Exfiltration
- Hardcoded URLs direct information to external servers, raising issues about user activity monitoring, such as to ByteDance "volce.com" endpoints. NowSecure identifies these in the iPhone app the other day as well.
- Bespoke file encryption and information obfuscation techniques exist, with indicators that they could be used to exfiltrate user details.
Будьте внимательны! Это приведет к удалению страницы «Static Analysis of The DeepSeek Android App»
.