Static Analysis of The DeepSeek Android App
karolinklug24 hat diese Seite bearbeitet vor 4 Monaten


I carried out a static analysis of DeepSeek, a Chinese LLM chatbot, archmageriseswiki.com using variation 1.8.0 from the Google Play Store. The goal was to recognize prospective security and personal privacy problems.

I've composed about DeepSeek previously here.

Additional security and personal privacy concerns about DeepSeek have been raised.

See likewise this analysis by NowSecure of the iPhone version of DeepSeek

The findings detailed in this report are based purely on static analysis. This implies that while the code exists within the app, there is no definitive proof that all of it is carried out in practice. Nonetheless, the existence of such code warrants scrutiny, specifically provided the growing issues around information privacy, monitoring, forum.altaycoins.com the prospective misuse of AI-driven applications, and cyber-espionage characteristics in between international powers.

Key Findings

Suspicious Data Handling & Exfiltration

- Hardcoded URLs direct data to external servers, raising concerns about user activity monitoring, such as to ByteDance "volce.com" endpoints. NowSecure recognizes these in the iPhone app the other day too. - Bespoke encryption and data obfuscation methods are present, with indicators that they might be utilized to exfiltrate user details.