Many of you may remember that in my writing on the rise of Deepseek a few weeks ago, I had stressed that everything was perhaps not what it seems because of the Chinese roots of the AI start-up. This is the reason why I have never downloaded the Deepseek application on a smartphone, sticking by choice to the web version. But millions have done so (and the few I have managed to prevent downloading the Deepseek, pale in comparison) application, and their phone data can be at risk. The authorities and companies in this country (and they are not the only ones, unfortunately) like to collect data. Of course, Deepseek has no official link from the government, but is everything too difficult to imagine? The first clues of a disturbing reality can emerge now. Mobile security company Nowsecure has published a safety assessment which indicates that the iOS application of Deepseek is a very risky bet. There are a lot of problems because researchers try to illustrate all those who are ready to listen to.
- The Deepseek application deactivates an iOS data security measure called Application Transport Security (ATS), which prevents sensitive data from being sent to non -encrypted channels. Once this protection is disabled, the application is able to send unacyed data. Not only can Deepseek servers receive all this data (and indeed also reallocate it to other web entities), but it also makes these transmissions more vulnerable to anyone on a network.
- Nowsecure underlines that this is an ill-made application (perhaps by design), including an algorithm of symmetrical encryption without security, which, according to them, is a “bad choice to protect the confidentiality of data”.
- There is a certain level of certainty that the Deepseek application on iPhone sends unacline data on Volengine, a cloud service platform belonging to another Chinese technology company bytedance. You may remember what Hullabaloo around Tiktok in the United States due to user data security problems. Bytedance has Tiktok.
- Data is also sent to other third-party platforms, once again probably in unacceptable format, which could facilitate the disanonym of this data and connect it to users. This is how virtual profiles are manufactured, and this is how users are followed.
“By examining the accessible sensitive APIs and the methods followed, the iOS Deepseek application presents behaviors which indicate a high risk of fingerprints and monitoring”, a rather disturbing summary of researchers, which clearly indicates that a more examination ‘Examination of the application behavior is much in progress. You can ask – why Apple (and when it appears to them, Google) identifying these potential risks? The answer is simple-Apple, Google or no application platform cannot eliminate risky applications from their platform with 100%precision. They have measures in place to detect harmful behavior, but often, they tend to hide well by developers. As it stands, in the iOS application of Deepseek.
More analyzes on AI and intersection:
CENSORSHIP
A few days ago, the good people of Proton shared interesting data – How 2024 was in terms of censorship on the internet. The year earns greater, because it includes many trends, because this 12-month period has seen 64 countries organize national elections, including the United States, India and the United Kingdom. But closings on the Internet and attempted censorships are not only linked to the elections, which was illustrated in Bangladesh, France, Turkey, Pakistan, Brazil and Venezuela, to name just a few . The Tiff of Brazil with Elon Musk owned X, being an example.
Proton says that they have observed peaks in registration in Proton VPN in 119 countries, including 6 countries with at least one signaling of more than 5,000%, 4 countries with at least one signaling of more than 10,000 %. In terms of volume of these points on the back of a repression or censorship, Latin America and the Caribbean head with 20 peaks of downloads until 2024, while South Asia (15 points) and Sub -Saharan Africa, Central Asia and Eastern Europe (13 points each) follow.
The proton anti-censorship is as strong as possible, through VPN applications that are worth the money you pay for subscriptions. There is an intelligent protocol methodology to detect when VPN protocols are generally blocked by one network and can move to another. There is also another routing of web traffic for a user via third -party servers in case the proton servers are blocked.
Our vast commentary on VPN platforms…
Rear door
It turns out that security agencies in the United Kingdom want Apple to build a stolen door allowing them to access the otherwise encrypted iCloud data from any user. Apple has not yet commented on the question, but there are reports suggest that the “technical notice of technical capacities” of the United Kingdom under the law on investigation powers (IPA) is a means of putting Apple in The fold to provide data to help law enforcement organizations. Apple always says that data confidentiality is a “fundamental human law”, and their position on this subject would be interesting. As they do something afterwards.
Whatever the way it happens (whether Apple conforms or withdraws certain services on the British market), you have the choice to protect your data. There is something called Advanced Data Protection (ADP) which is part of iOS 18. Here is what you should do: Settings> iCloud> Advanced data protection> Activate. At this point, you will have the choice to set up a recovery contact or a recovery key. Apple clearly indicates that you will be responsible for data recovery in the future. “If you use advanced data protection, you are responsible for your data recovery. Since Apple will not have the keys to recover your data, you will have to have a contact button or a recovery key to your account. “Keep this key or contact near you, it goes without saying! It could, in due time, remain the safest course of action if the confidentiality of the data of everything you have on iCloud is important.