DeepSeek collects keystroke data and more, storing it in Chinese servers
-
[email protected]replied to [email protected] last edited by
But that's not what the terms on both Google/Meta and Deepseek say.
Google/Meta has no obligation to restrict the data collection to forms, if the ToS allow them to collect them rom forms, then there's no reason it also does not allow them to collect them outside of forms. In the same way, Deepseek terms don't say the logging happens outside of logs. For all we know the only place they might be capturing it is exclusively in very specific forms, or they might even only added that to the terms so that they can add suggestions in the future. You can only make assumptions, since the terms are not specific on exactly what's being captured and in which way, it only says keystrokes in the case of Deepseek and even more generic (and thus allowing more possible vectors) in Google/Meta's terms.
-
[email protected]replied to [email protected] last edited by
This is the full paragraph:
We collect certain device and network connection information when you access the Service. This information includes your device model, operating system, keystroke patterns or rhythms, IP address, and system language. We also collect service-related, diagnostic, and performance information, including crash reports and performance logs. We automatically assign you a device ID and user ID. Where you log-in from multiple devices, we use information such as your device ID and user ID to identify your activity across devices to give you a seamless log-in experience and for security purposes.
It looks to me that they are trying to identify the user uniquely.. maybe also related to captcha to prevent bots (it's common practice to capture mouse and keyboard while resolving captchas to see if the movement is human-like).
-
[email protected]replied to [email protected] last edited by
it is open-source, if they did something like this, we would know it for sure
-
[email protected]replied to [email protected] last edited by
most apps i have just have no way to collect my keystrokes. it is pretty hard to pull off with an open-source app, without anyone noticing
-
[email protected]replied to [email protected] last edited by
your raspberry pi will burn if you want to host an ai model on it. you need a high end gamer pc with at least 32 gb ram and rtx 4090
-
[email protected]replied to [email protected] last edited by
lol no. only the sounds of the keys can identify the keyboard's model
-
[email protected]replied to [email protected] last edited by
nvidia is one of the greediest companies rn
-
[email protected]replied to [email protected] last edited by
The goal is not to identify keyboard model. The goal is to identify person. And people tend to have something called habbits.
-
[email protected]replied to [email protected] last edited by
All public companies by definition have to be greedy it's unfortunate but it's how capitalism works.
-
[email protected]replied to [email protected] last edited by
Looks like there are more things I need to start randomizing and injecting with noise.
-
[email protected]replied to [email protected] last edited by
nvidia takes that to a whole new level
-
[email protected]replied to [email protected] last edited by
the chance of this is almost zero. if you are a dangerous cybercriminal, they will track your device down by a networking solution, wait until you leave it unattended and install a hardware-based spy device and capture evidence. No fbi agent will fuck around with keyboard sounds or movie bs like that
-
[email protected]replied to [email protected] last edited by
Unfortunately, we have a lot of that unprecedented stuff going around. The whole damn world is three corporations in a trechcoat and they're increasingly running governments.
-
[email protected]replied to [email protected] last edited by
with keyboard sounds
Ok, I see you are intentionally going in circles.