DeepSeek iOS app sends data unencrypted to ByteDance-controlled servers
-
[email protected]replied to [email protected] last edited by
-
[email protected]replied to [email protected] last edited by
Ah, the ol' Blahaj Pik-a-choo
-
[email protected]replied to [email protected] last edited by
-
[email protected]replied to [email protected] last edited by
Do you understand what you’re commenting on or just commenting hoping it’s funny?
-
[email protected]replied to [email protected] last edited by
This is dumb.
Even if you encrypt network traffic, the receiving server still knows what you're doing. All it does is prevent third parties from snooping.
Usually.
-
[email protected]replied to [email protected] last edited by
i just can't think of any. like the article says, i fully expected the app to send data to china. but even if you are maliciously spying on users, why would you send the stolen data on unsecured channels? so that everyone in the path takes advantage of the data your wanted to steal?
-
[email protected]replied to [email protected] last edited by
Yes, so not only are they doing something shady, they're doing something shady and exposing your data to anyone wanting to snoop it. What's dumb about criticising the latter part?
-
[email protected]replied to [email protected] last edited by
Depends on how much traffic you're talking about. Encrypting/decrypting isn't free.
-
[email protected]replied to [email protected] last edited by
It’s trivial compared to the compute they dedicate to AI models. Like, not even a rounding error.
-
[email protected]replied to [email protected] last edited by
The fact that anyone thinks they have any semblance of privacy when typing into an online AI chatbot is saddening.
Of course anything you type into a externally hosted AI is going to be harvested and sold.
But sure, in this case you are also potentially exposing your queries to your ISP or someone listening on your local network too.
-
[email protected]replied to [email protected] last edited by
️️
🫦
-
[email protected]replied to [email protected] last edited by
Regardless of the downstream server, you should expect the interim traffic to be encrypted in transit
-
[email protected]replied to [email protected] last edited by
Maybe they want 3rd parties snooping?
-
[email protected]replied to [email protected] last edited by
If you are implying that a government wants your data, they can just buy it or request it from the company directly. They don't have to snoop to get it. Also SSL isn't going to stop them.
-
[email protected]replied to [email protected] last edited by
Sure, it's not a bad thing and it should be standard practice, but to act like encrypted traffic guarantees privacy is silly.
-
[email protected]replied to [email protected] last edited by
A penny saved is still a penny saved. I'm not saying it would amount to much, but it is non-zero.
-
[email protected]replied to [email protected] last edited by
Tell me where in this thread are anyone expecting privacy from any online LLM service, or anyone saying encrypted traffic guarantees privacy?
-
[email protected]replied to [email protected] last edited by
I sincerely doubt they're bad at it.
-
[email protected]replied to [email protected] last edited by
Privacy is not the same as security
-
[email protected]replied to [email protected] last edited by
The thing is that with the traffic unencrypted it opens the door to all sorts of attacks on that traffic.
It’s not just privacy.
If you can intercept and interpret you have the ability to replace as well.