DeepSeek iOS app sends data unencrypted to ByteDance-controlled servers
-
[email protected]replied to [email protected] last edited by
This is dumb.
Even if you encrypt network traffic, the receiving server still knows what you're doing. All it does is prevent third parties from snooping.
Usually.
-
[email protected]replied to [email protected] last edited by
i just can't think of any. like the article says, i fully expected the app to send data to china. but even if you are maliciously spying on users, why would you send the stolen data on unsecured channels? so that everyone in the path takes advantage of the data your wanted to steal?
-
[email protected]replied to [email protected] last edited by
Yes, so not only are they doing something shady, they're doing something shady and exposing your data to anyone wanting to snoop it. What's dumb about criticising the latter part?
-
[email protected]replied to [email protected] last edited by
Depends on how much traffic you're talking about. Encrypting/decrypting isn't free.
-
[email protected]replied to [email protected] last edited by
Itβs trivial compared to the compute they dedicate to AI models. Like, not even a rounding error.
-
[email protected]replied to [email protected] last edited by
The fact that anyone thinks they have any semblance of privacy when typing into an online AI chatbot is saddening.
Of course anything you type into a externally hosted AI is going to be harvested and sold.
But sure, in this case you are also potentially exposing your queries to your ISP or someone listening on your local network too.
-
[email protected]replied to [email protected] last edited by
οΈ
οΈ
π«¦
-
[email protected]replied to [email protected] last edited by
Regardless of the downstream server, you should expect the interim traffic to be encrypted in transit
-
[email protected]replied to [email protected] last edited by
Maybe they want 3rd parties snooping?
-
[email protected]replied to [email protected] last edited by
If you are implying that a government wants your data, they can just buy it or request it from the company directly. They don't have to snoop to get it. Also SSL isn't going to stop them.
-
[email protected]replied to [email protected] last edited by
Sure, it's not a bad thing and it should be standard practice, but to act like encrypted traffic guarantees privacy is silly.
-
[email protected]replied to [email protected] last edited by
A penny saved is still a penny saved. I'm not saying it would amount to much, but it is non-zero.
-
[email protected]replied to [email protected] last edited by
Tell me where in this thread are anyone expecting privacy from any online LLM service, or anyone saying encrypted traffic guarantees privacy?
-
[email protected]replied to [email protected] last edited by
I sincerely doubt they're bad at it.
-
[email protected]replied to [email protected] last edited by
Privacy is not the same as security
-
[email protected]replied to [email protected] last edited by
The thing is that with the traffic unencrypted it opens the door to all sorts of attacks on that traffic.
Itβs not just privacy.
If you can intercept and interpret you have the ability to replace as well.
-
[email protected]replied to [email protected] last edited by
How the fuck do I explain this boner, now?
-
[email protected]replied to [email protected] last edited by
If leaking data is intentional then there are better ways than doing it in the open. Doubly so if you supposedly are in cahoots with your hosting and Chinese government.
-
[email protected]replied to [email protected] last edited by
These are completely different systems. It doesn't make a difference.
-
[email protected]replied to [email protected] last edited by
loudly places hand on side of face