1 Static Analysis of The DeepSeek Android App
Adelaide Tuckfield edited this page 2025-02-10 19:54:18 +07:00


I carried out a static analysis of DeepSeek, a Chinese LLM chatbot, using version 1.8.0 from the Google Play Store. The objective was to determine possible security and personal privacy issues.

I have actually blogged about DeepSeek previously here.

Additional security and kenpoguy.com privacy issues about DeepSeek have been raised.

See also this analysis by NowSecure of the iPhone version of DeepSeek

The findings detailed in this report are based purely on fixed analysis. This means that while the code exists within the app, genbecle.com there is no definitive evidence that all of it is in practice. Nonetheless, fakenews.win the existence of such code warrants analysis, especially given the growing concerns around information privacy, surveillance, the potential misuse of AI-driven applications, and cyber-espionage dynamics between international powers.

Key Findings

Suspicious Data Handling & Exfiltration

- Hardcoded URLs direct data to external servers, raising concerns about user activity tracking, such as to ByteDance "volce.com" endpoints. NowSecure identifies these in the iPhone app yesterday as well. - Bespoke file encryption and information obfuscation methods are present, with indications that they might be used to exfiltrate user details.