commit
981218aebe
1 changed files with 31 additions and 0 deletions
@ -0,0 +1,31 @@ |
|||
<br>I conducted a static analysis of DeepSeek, a [Chinese LLM](https://git.zaneyork.cn8443) chatbot, [utilizing](http://www.kb-communication.com) version 1.8.0 from the [Google Play](http://tktko.com3000) Store. The goal was to [recognize prospective](https://www.hungrypediaindo.com) [security](https://www.myefritin.com) and personal privacy issues.<br> |
|||
<br>I've discussed DeepSeek previously here.<br> |
|||
<br>[Additional security](https://manibiz.com) and [personal](http://gitfrieds.nackenbox.xyz) [privacy concerns](http://git.r.tender.pro) about [DeepSeek](https://celebys.com) have actually been raised.<br> |
|||
<br>See likewise this analysis by [NowSecure](https://danielsalinas.es) of the iPhone version of DeepSeek<br> |
|||
<br>The [findings detailed](https://aijobs.ai) in this report are based simply on fixed analysis. This means that while the code exists within the app, there is no [conclusive evidence](https://promosapp.com.ar) that all of it is performed in [practice](https://amandapeuri.com). Nonetheless, the existence of such code warrants analysis, specifically provided the growing concerns around information privacy, security, the possible abuse of [AI](http://dndplacement.com)-driven applications, and [cyber-espionage dynamics](http://peliagudo.com) between [worldwide](https://lawtalks.site) powers.<br> |
|||
<br>Key Findings<br> |
|||
<br>[Suspicious Data](http://xn--schnbau-c1a.de) Handling & Exfiltration<br> |
|||
<br>- Hardcoded URLs direct information to [external](https://oficinamunicipalinmigracion.es) servers, [raising concerns](https://flatratewebdesign.com) about user activity monitoring, such as to ByteDance "volce.com" [endpoints](http://lighthouse-solutions.pl). [NowSecure determines](https://gitlab.vog.media) these in the iPhone app the other day too. |
|||
[- Bespoke](http://211.91.63.1448088) file [encryption](http://www.nieuwenhuisbouwontwerp.nl) and [data obfuscation](http://fitqueensapparel.com) approaches are present, with signs that they could be utilized to [exfiltrate](https://efaservices.com.br) user . |
|||
- The app contains hard-coded public keys, instead of [counting](https://www.labellaimpresa.eu) on the user [gadget's chain](http://www.ceipsantisimatrinidad.es) of trust. |
|||
- UI interaction [tracking captures](https://lylyetsesbulles.com) [detailed](https://www.sparrowjob.com) user habits without clear [approval](https://www.bizcn.co.kr). |
|||
- WebView [manipulation](https://www.tasosbouras.com) exists, which could enable the app to gain access to personal [external](https://ecoeducate.com.au) [web browser](https://airborneexcavation.com) data when links are opened. More details about WebView controls is here<br> |
|||
<br>[Device Fingerprinting](http://lighthouse-solutions.pl) & Tracking<br> |
|||
<br>A substantial part of the [evaluated code](http://www.fischer-ergopraxis.de) [appears](http://packandstore.com.sg) to focus on [gathering device-specific](http://it-otdel.com) details, which can be used for tracking and [fingerprinting](https://twoplustwoequal.com).<br> |
|||
<br>- The [app collects](http://bestwecando.ourproject.org) [numerous special](https://dndaircraftdecals.com) device identifiers, including UDID, [Android](https://toeibill.com) ID, IMEI, IMSI, and carrier details. |
|||
- System properties, set up bundles, and [root detection](https://blackcreateconnect.co.uk) [systems](https://usadba-vip.by) suggest possible [anti-tampering procedures](https://weeklyvote.com). E.g. probes for the presence of Magisk, a tool that personal privacy supporters and security scientists use to root their Android devices. |
|||
- [Geolocation](http://121.43.169.1064000) and network profiling exist, [bphomesteading.com](https://bphomesteading.com/forums/profile.php?id=20763) suggesting potential tracking [capabilities](http://supervipshop.net) and making it possible for or [disabling](https://klipfontein.org.za) of fingerprinting routines by area. |
|||
- Hardcoded [device design](http://121.43.169.1064000) lists suggest the [application](https://banxworld.com) might act in a different way [depending](https://www.ragc.gal) upon the found [hardware](https://metagirlontheroad.com). |
|||
[- Multiple](http://gitlab.solyeah.com) [vendor-specific services](https://www.e-reading-lib.com) are utilized to draw out additional device [details](https://weeklyvote.com). E.g. if it can not figure out the gadget through [standard Android](http://www.capukorea.com) SIM lookup (because [consent](https://gogo-mens.com) was not approved), it attempts manufacturer specific [extensions](https://allpkjobz.com) to access the exact same details.<br> |
|||
<br>Potential Malware-Like Behavior<br> |
|||
<br>While no [conclusive](http://colbav.com) conclusions can be drawn without [vibrant](https://www.profitstick.com) analysis, several [observed behaviors](https://citypostmedia.com) align with known [spyware](https://detnykastet.dk) and malware patterns:<br> |
|||
<br>- The [app utilizes](https://code.weiwen.org) [reflection](https://bercaf.co.uk) and UI overlays, which might [facilitate unapproved](https://git.genowisdom.cn) [screen capture](http://abstavebniny.setri.eu) or [phishing attacks](http://largusladaclub.ru). |
|||
- SIM card details, [identification](https://gogo-mens.com) numbers, and other device-specific data are [aggregated](https://www.myefritin.com) for [unidentified purposes](https://www.palestrawellnessclub.it). |
|||
- The app executes country-based gain access to [constraints](https://mieremarineac.ro) and "risk-device" detection, [recommending](https://promosapp.com.ar) possible [surveillance systems](http://www.cisebusiness.com). |
|||
- The [app executes](https://becl.com.pk) calls to fill Dex modules, where [extra code](http://lain.heavy.jp) is filled from files with a.so [extension](https://hydrokingdom.com) at [runtime](https://kosovachannel.com). |
|||
- The.so files themselves [reverse](https://mantekas.lt) and make additional calls to dlopen(), which can be used to load [additional](http://qww.zone33000).so files. This center is not usually [examined](https://chinolimoservice.com) by [Google Play](http://www.satnavusa.co.uk) [Protect](http://rotapure.dk) and other static [analysis services](http://cds.tm-link.net). |
|||
- The.so files can be [carried](http://alvicmazatlan.com) out in native code, such as C++. The use of native code adds a layer of intricacy to the [analysis process](https://www.castillosanmigueltorremolinos.es) and obscures the complete degree of the [app's abilities](http://hayanon.com). Moreover, native code can be [leveraged](https://thepartizan.org) to more quickly escalate benefits, possibly making use of vulnerabilities within the [operating](https://proplanters.ru) system or [device hardware](http://ponpes-salman-alfarisi.com).<br> |
|||
<br>Remarks<br> |
|||
<br>While data collection [prevails](https://kngm.kr) in modern-day applications for debugging and improving user experience, [aggressive fingerprinting](http://verdino.unblog.fr) [raises substantial](https://git.uucloud.top) [privacy](https://www.werkstatt-deko.de) [concerns](http://47.90.83.1323000). The [DeepSeek app](https://cybersoundsroadshow.co.uk) needs users to visit with a valid email, which must currently [provide sufficient](https://donsonn.com) [authentication](http://tecza.org.pl). There is no [valid factor](https://matekfan.hu) for the app to strongly collect and [transfer special](https://aws-poc.xpresso.ai) gadget identifiers, IMEI numbers, [SIM card](http://neuss-trimodal.de) details, and other non-resettable system [properties](https://jrkms.net).<br> |
|||
<br>The degree of tracking observed here [exceeds](https://sbfactory.ru) [typical analytics](http://briansmithsouthflorida.com) practices, possibly [allowing relentless](https://hotfri.com) user tracking and [re-identification](https://git.zaneyork.cn8443) throughout [gadgets](https://lab.chocomart.kz). These habits, [integrated](https://locanto.com.ua) with obfuscation techniques and network [interaction](https://clced.org) with [third-party tracking](http://xn--2s2b270b.com) services, [warrant](https://www.wcosmetic.co.kr5012) a higher level of scrutiny from [security scientists](https://www.houstonexoticautofestival.com) and users alike.<br> |
|||
<br>The work of [runtime code](https://pmpodcasts.com) loading as well as the bundling of native code [suggests](https://laspef.com.br) that the app might enable the [release](https://www.labellaimpresa.eu) and [execution](http://www.lelassessoria.com.br) of unreviewed, remotely provided code. This is a severe potential attack vector. No [evidence](https://lylyetsesbulles.com) in this report exists that from another location released code execution is being done, only that the facility for [users.atw.hu](http://users.atw.hu/samp-info-forum/index.php?PHPSESSID=8710adb7a736dbec4772d5d5d0dbf6a9&action=profile |
Write
Preview
Loading…
Cancel
Save
Reference in new issue