DeepSeek: Uncovering Major Privacy and Security Risks

Published
February 10, 2025
LAST UPDATED
February 10, 2025
apps
No items found.
TL;DR

DeepSeek's AI app poses major privacy and security risks.

By the way, we're Bardeen, we build a free AI Agent for doing repetitive tasks.

If you're concerned about privacy, try Bardeen's AI Web Scraper. It helps you monitor data changes and protect your information from potential risks.

Privacy and security concerns are mounting as DeepSeek's AI app surges in popularity. With over half of companies worldwide trying out the app, experts warn of potential data exposure risks. DeepSeek's terms of service reveal user data is stored on servers in China, raising red flags about government access and cyberespionage.

This guide uncovers the critical flaws in DeepSeek's data practices and provides actionable steps to mitigate the risks. Are you prepared to protect your organization's sensitive information from potential DeepSeek threats?

Insecure Data Transmission, Storage, and Extensive Collection

The DeepSeek iOS app has multiple critical security and privacy flaws that jeopardize sensitive user data. Our analysis found the app transmits usernames, passwords, encryption keys, and other private information over unencrypted channels, making it vulnerable to interception. It also uses weak, outdated 3DES encryption with hardcoded keys that are easily extractable. User data is stored insecurely on devices in cached databases, increasing the risk of unauthorized access if a device is compromised.

DeepSeek extensively collects data on users and their devices that can be used for tracking and de-anonymization. This includes:

  1. Device name, often containing the user's real name
  2. IP address
  3. Advertising IDs
  4. Operating system version
  5. Language settings
  6. Color schemes

This data is transmitted to servers belonging to ByteDance and governed by laws of the People's Republic of China, raising major privacy and compliance concerns. The aggregation of data points collected by the DeepSeek app and other sources enables precise identification of individual users, even without directly using their name.

1. Unencrypted Transmission of Sensitive Data

The DeepSeek iOS app sends usernames, passwords, encryption keys and other private data over the internet with no encryption. This exposes the information to interception and modification by attackers, especially on public Wi-Fi networks. Even when using a cellular connection, recent breaches of major US mobile carriers by Chinese hacking groups puts this data at risk of surveillance and misuse.

Apple provides default protections to prevent apps from sending sensitive data insecurely, but DeepSeek deliberately disabled this App Transport Security feature globally. As a result, private user information is transmitted in plain text that anyone on the network can read.

2. Insecure Encryption with Hardcoded Keys

DeepSeek claims to encrypt some user data, but does so in a highly insecure way. The app uses the deprecated and weak Triple DES (3DES) algorithm and hardcodes the encryption keys directly into the app. It also reuses initialization vectors, further weakening the encryption.

This means anyone can easily extract the encryption keys from the app and decrypt private data. Hardcoding keys is an extremely poor security practice that exposes DeepSeek's lack of basic data protection competencies.

3. Sensitive Data Stored in Cached Databases on Devices

The DeepSeek app was found to be caching sensitive data like usernames, passwords, and encryption keys in databases on user devices. While protected when the device is locked, this data can be recovered and abused if an attacker gains physical access to an unlocked device.

Cached data like this should be avoided for highly sensitive information. However, DeepSeek failed to disable caching when transmitting private user data, increasing the risk of exposure through a lost or stolen device.

In the next section, we'll take a closer look at DeepSeek's extensive collection of user data and how it puts privacy at risk by enabling individual identification and tracking. The app collects dozens of data points on each user that can be combined with information from other sources to de-anonymize and surveil users without their awareness.

DeepSeek Collects Vast Amounts of User Data

The DeepSeek iOS app gathers an alarming amount of data on its users that, when combined, can precisely identify individuals even without using their name directly. This includes device names that often contain the owner's real name, IP addresses, advertising IDs, operating system versions, language settings, and color schemes. Collecting such an extensive array of data points enables DeepSeek to create unique digital fingerprints of users that can be used for tracking and de-anonymization.

Even more concerning, all this sensitive user data is transmitted to servers belonging to ByteDance and other Chinese companies like Volcengine. This raises major red flags about the privacy and security of the information, as it becomes subject to China's legal system and the broad data access it grants to the government. With U.S. user data being stored and processed in China, it could be obtained by Chinese authorities for surveillance and espionage purposes.

1. DeepSeek's Massive Collection of User and Device Data

When you use the DeepSeek iOS app, it vacuums up a trove of data about you and your device. This includes your device name, IP address, advertising ID, operating system version, language settings, color schemes, and more. By gathering so many different data points, DeepSeek can piece together a unique "fingerprint" that identifies you as an individual user.

For example, your device name alone, like "John's iPhone", can reveal your real name to DeepSeek. Coupled with your IP address, this ties your identity to a specific location. Advertising IDs allow further tracking of your activity across other apps and websites. Even choices like your language settings and color schemes help distinguish you from other users. Aggregated together from the app and other sources, this data enables DeepSeek to figure out exactly who you are.

2. User Data Sent to ByteDance and Governed by Chinese Laws

The extensive data collected by the DeepSeek iOS app doesn't just stay on your device. It's transmitted to servers belonging to ByteDance and other Chinese companies like Volcengine. This means your private information is being sent to China, where it becomes subject to the country's legal system and cybersecurity laws.

Under China's legal framework, companies are required to share data with the government upon request. They must also store data locally and submit to security assessments. This raises major concerns that U.S. user data collected by DeepSeek could be accessed and leveraged by Chinese authorities for surveillance, espionage, or other nefarious purposes, with little recourse for users.

3. Broad Data Sharing Provisions in DeepSeek's Privacy Policy

DeepSeek's own privacy policy reveals the extent of data sharing that occurs. It states that user data is not only stored and processed in China, but can be shared with a wide range of third parties. This includes ByteDance, its subsidiaries, service providers, and other business partners.

The reasons given for this data sharing are vague and far-reaching - from supporting the app's operation to improving the user experience to "other purposes" disclosed in the privacy policy. With such broad language, it's unclear exactly who is getting access to DeepSeek user data and how it's being used. The privacy policy raises more questions than it answers about the safety of personal information collected by the app.

DeepSeek's extensive harvesting of user data that can precisely identify individuals, combined with its storage in China and broad sharing provisions, poses serious risks to the privacy and security of the app's users. In the next section, we'll look at steps you can take to mitigate these dangers when using DeepSeek.

Save time and reduce manual effort by learning how to automate your data tasks with Bardeen's LinkedIn Profile Data Playbook, perfect for lead generation and market research.

Protecting Your Data and Devices from DeepSeek's Security Flaws

With the discovery of significant security vulnerabilities and privacy concerns in the DeepSeek iOS app, organizations and individuals should take immediate action to safeguard their sensitive data and devices. Enterprises that have allowed the use of DeepSeek on managed devices or through BYOD policies are at especially high risk of data exposure and should move quickly to prevent further usage of the app. Here are key steps you can take to mitigate the dangers posed by DeepSeek's security and privacy shortcomings.

1. Remove DeepSeek from All Managed and BYOD Devices

The most critical action for organizations is to immediately remove the DeepSeek iOS app from any device that stores or accesses sensitive company data. This includes both corporate-managed devices and employee-owned devices under BYOD (Bring Your Own Device) programs. Given the severity of the app's security flaws - including unencrypted data transmission and hardcoded encryption keys - any business information entered into DeepSeek could be intercepted or compromised.

IT and security teams should use mobile device management (MDM) solutions to block and remove DeepSeek from managed devices. For BYOD, clear communications should be sent to employees directing them to uninstall the app from personal devices used for work. Deleting the app is crucial to prevent further data exposure, as simply disabling or logging out of the app may not be sufficient if vulnerabilities persist.

2. Evaluate Alternative AI Platforms with Robust Security

For organizations seeking to leverage AI technologies while prioritizing data protection, exploring alternative platforms to DeepSeek is advised. When evaluating options, look for AI providers that have demonstrated strong commitments to security and privacy. This includes the use of industry-standard encryption for data in transit and at rest, regular security audits and penetration testing, and compliance with relevant data protection regulations like GDPR or HIPAA.

In particular, consider AI platforms that allow for on-premises or private cloud deployment, giving you greater control over data storage and access. Some providers also offer advanced security features like granular access controls, data segregation between customers, and the ability to purge data upon request. By carefully assessing the security posture of alternative AI vendors, you can find solutions that deliver similar capabilities to DeepSeek while better safeguarding sensitive data.

3. Implement Continuous Mobile App Monitoring

The discovery of serious flaws in a widely-used app like DeepSeek underscores the importance of continuously monitoring the mobile apps in your environment for emerging security and privacy risks. Even apps that initially appear secure can introduce new vulnerabilities or concerning behaviors with updates, making ongoing vigilance essential.

Implement mobile app vetting solutions that can automatically scan apps installed on managed devices for a wide range of risks, including insecure data storage, communication over unencrypted channels, access to sensitive device functions, and connections to high-risk countries. Such tools can help you quickly identify apps exhibiting suspicious or dangerous behaviors, enabling prompt action to investigate and mitigate potential threats before they lead to data compromise.

DeepSeek's security failures highlight the critical need for organizations to scrutinize the mobile apps handling their sensitive data, both to preserve privacy and to maintain compliance with increasingly stringent regulations. By removing DeepSeek, adopting more secure alternatives, and proactively monitoring all enterprise mobile apps, you can significantly reduce the risk of exposure from untrustworthy or poorly-protected applications.

Wow, you made it this far! Thanks for sticking with us - we know this stuff can be pretty dense. Just remember, a little caution and common sense go a long way in keeping your data safe from prying eyes and digital ne'er-do-wells. Stay vigilant, friends!

Conclusions

Understanding DeepSeek's critical privacy and security flaws is crucial for protecting sensitive data. This article covered:

  • DeepSeek's insecure data transmission and storage practices that expose user information
  • The app's extensive collection of device data and sharing with Chinese companies
  • Steps organizations and users can take to mitigate risks from DeepSeek's security issues

Don't let your data privacy become a deep secret - stay informed on DeepSeek security to avoid getting caught in the digital undertow! Consider using tools like free AI web scraper to monitor and protect your data effectively.

Bardeen can help you secure your data by allowing you to scrape data from website and easily monitor changes. Take control of your information and stay ahead of potential risks.

Jason Gong

Jason is the Head of Growth at Bardeen. As a previous YC founder and early growth hire at Kite and Affirm, he is an expert on scaling high-leverage sales, marketing, and GTM tactics across multiple channels with automation. The same type of automation Bardeen is now innovating with AI. He lives in Oakland with his family and enjoys hikes, tennis, golf, and anything that can tire out his dog Orca.

Contents

The AI Copilot for GTM Teams

Start automating sales, marketing, and operations tasks with the first AI Copilot for GTM teams.

Schedule a demo
Get started

Automate to supercharge productivity

No items found.
No items found.

Related frequently asked questions

Embed Calendly: Complete Guide for Website Integration

Learn how to embed Calendly on your website with our step-by-step guide. Discover integration tips for WordPress, Squarespace, and more.

Read more
How to Find Top LinkedIn Groups for B2B Success

Discover how to find the best LinkedIn groups to join for B2B success. Find strategies, engage prospects, and leverage insights for your business.

Read more
Maximize Lead Gen with Conversational AI: Key Strategies

Discover how Conversational AI transforms lead generation: engage more effectively, reduce costs, and scale your efforts. Learn key strategies for 2024.

Read more
How to Clean Your Klaviyo List: Boost Deliverability

Learn how to clean your Klaviyo email list to improve deliverability, reduce bounces, and save costs. Follow best practices for a cleaner list.

Read more
Create HubSpot Landing Page Templates: A Step-by-Step Guide

Learn to create a HubSpot landing page template in a few steps, including template selection, customization, and publishing for effective marketing.

Read more
What Is Klaviyo? A Beginner’s Guide to Email Marketing

Discover how Klaviyo can transform your email marketing strategy. Learn about its features, setup, and integration with popular tools.

Read more
how does bardeen work?

Your proactive teammate — doing the busywork to save you time

Integrate your apps and websites

Use data and events in one app to automate another. Bardeen supports an increasing library of powerful integrations.

Perform tasks & actions

Bardeen completes tasks in apps and websites you use for work, so you don't have to - filling forms, sending messages, or even crafting detailed reports.

Combine it all to create workflows

Workflows are a series of actions triggered by you or a change in a connected app. They automate repetitive tasks you normally perform manually - saving you time.

get bardeen

Don't just connect your apps, automate them.

200,000+ users and counting use Bardeen to eliminate repetitive tasks

Effortless setup
AI powered workflows
Free to use
Reading time
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
By clicking “Accept”, you agree to the storing of cookies. View our Privacy Policy for more information.