DeepSeek iOS app sends data unencrypted to ByteDance-controlled servers
-
[email protected]replied to [email protected] last edited by
The fact that anyone thinks they have any semblance of privacy when typing into an online AI chatbot is saddening.
Of course anything you type into a externally hosted AI is going to be harvested and sold.
But sure, in this case you are also potentially exposing your queries to your ISP or someone listening on your local network too.
-
[email protected]replied to [email protected] last edited by
οΈ
οΈ
π«¦
-
[email protected]replied to [email protected] last edited by
Regardless of the downstream server, you should expect the interim traffic to be encrypted in transit
-
[email protected]replied to [email protected] last edited by
Maybe they want 3rd parties snooping?
-
[email protected]replied to [email protected] last edited by
If you are implying that a government wants your data, they can just buy it or request it from the company directly. They don't have to snoop to get it. Also SSL isn't going to stop them.
-
[email protected]replied to [email protected] last edited by
Sure, it's not a bad thing and it should be standard practice, but to act like encrypted traffic guarantees privacy is silly.
-
[email protected]replied to [email protected] last edited by
A penny saved is still a penny saved. I'm not saying it would amount to much, but it is non-zero.
-
[email protected]replied to [email protected] last edited by
Tell me where in this thread are anyone expecting privacy from any online LLM service, or anyone saying encrypted traffic guarantees privacy?
-
[email protected]replied to [email protected] last edited by
I sincerely doubt they're bad at it.
-
[email protected]replied to [email protected] last edited by
Privacy is not the same as security
-
[email protected]replied to [email protected] last edited by
The thing is that with the traffic unencrypted it opens the door to all sorts of attacks on that traffic.
Itβs not just privacy.
If you can intercept and interpret you have the ability to replace as well.
-
[email protected]replied to [email protected] last edited by
How the fuck do I explain this boner, now?
-
[email protected]replied to [email protected] last edited by
If leaking data is intentional then there are better ways than doing it in the open. Doubly so if you supposedly are in cahoots with your hosting and Chinese government.
-
[email protected]replied to [email protected] last edited by
These are completely different systems. It doesn't make a difference.
-
[email protected]replied to [email protected] last edited by
loudly places hand on side of face
-
[email protected]replied to [email protected] last edited by
And that's why you use local instances...
-
[email protected]replied to [email protected] last edited by
Yep it also prevents anyone in the airport impersonating the WiFi and the bytedance server (which is trivial) and crafting payloads that run insecure code on your phone ( not that easy but there's heaps of CVEs like this in apps like Safari over the years, so there's at least 2x as many in an app like this)
-
[email protected]replied to [email protected] last edited by
Yep I'm with you.
It's so easy to use https with secure encryption. It's the default. You have to go out of your way to use s symmetric key or to even allow http without SSL in xcode or Android studio.
-
[email protected]replied to [email protected] last edited by
Well many of China's websites don't even use HTTPS. Look at china.org.cn, or en.people.cn for example
-
[email protected]replied to [email protected] last edited by
"Open"ai is definitely sharing everything you tipe with your government. Only difference is that chinese care less about your illusions. That said we are not even a blip in the sea of data so it doesn't matter anyway.
Bdw your patriot act says that any data that goes over your border can be stored and used indefinitely. So me seing your comment means your nsa will store it and can use it, even though spying on your own people is against your constitution or something.