2 Static Analysis of The DeepSeek Android App
Abel Gregorio edited this page 2 months ago


I carried out a fixed analysis of DeepSeek, a Chinese LLM chatbot, utilizing variation 1.8.0 from the Google Play Store. The goal was to recognize potential security and privacy issues.

I have actually written about DeepSeek formerly here.

Additional security and personal privacy issues about DeepSeek have actually been raised.

See also this analysis by NowSecure of the iPhone variation of DeepSeek

The findings detailed in this report are based simply on static analysis. This indicates that while the code exists within the app, there is no definitive proof that all of it is executed in practice. Nonetheless, the presence of such code warrants examination, especially provided the growing issues around information privacy, surveillance, photorum.eclat-mauve.fr the prospective abuse of AI-driven applications, and cyber-espionage characteristics between international powers.

Key Findings

Suspicious Data Handling & Exfiltration

- Hardcoded URLs direct information to external servers, raising issues about user activity monitoring, such as to ByteDance "volce.com" endpoints. NowSecure determines these in the iPhone app yesterday too. - Bespoke file encryption and information obfuscation methods exist, with signs that they might be utilized to exfiltrate user details.