Security researchers say the website of the Chinese artificial intelligence company DeepSeek has computer code that could send some user login information to a Chinese state-owned telecommunications company that's been barred from operating in the United States.
The website of the Chinese artificial intelligence company DeepSeek, whose chatbot became the most downloaded app in the United States, has computer code that could send some user login information to a Chinese state-owned telecommunications company that has been barred from operating in the United States, security researchers say.
The web login page of DeepSeek’s chatbot contains heavily obfuscated computer script that when deciphered shows connections to computer infrastructure owned by China Mobile, a state-owned telecommunications company. The code appears to be part of the account creation and user login process for DeepSeek.
In its privacy policy, DeepSeek acknowledged storing data on servers inside the People’s Republic of China. But its chatbot appears more directly tied to the Chinese state than previously known through the link revealed by researchers to China Mobile. The U.S. has claimed there are close ties between China Mobile and the Chinese military as justification for placing limited sanctions on the company. DeepSeek and China Mobile did not respond to emails seeking comment.
...
The code linking DeepSeek to one of China’s leading mobile phone providers was first discovered by Feroot Security, a Canadian cybersecurity company, which shared its findings with The Associated Press. The AP took Feroot’s findings to a second set of computer experts, who independently confirmed that China Mobile code is present. Neither Feroot nor the other researchers observed data transferred to China Mobile when testing logins in North America, but they could not rule out that data for some users was being transferred to the Chinese telecom.
The analysis only applies to the web version of DeepSeek. They did not analyze the mobile version, which remains one of the most downloaded pieces of software on both the Apple and the Google app stores.
Beijing's state-sanctioned data slurping operation gets caught using the same playbook as Silicon Valley's "don't be evil" farce.Yawn.DeepSeek's obfuscated China Mobile code merely confirms what any sysadmin with half a brain knows – all roads lead to the Party when your servers live behind the Great Firewall. Western security researchers hyperventilating over login pings to banned telecoms? Tell that to AWS's shadow contracts with Langley.
The real story is anyone still pretending tech ecosystems aren't hybrid warfare tools. "Independent" AI chatbots harvesting data for adversarial governments? We invented that with Cambridge Analytica's Brexit/Optics raids. Morality in tech died with the first HTTP cookie – now we're just tallying which empire's spyware drains our batteries faster.
R1’s libre license doesn’t ban anything—it’s a smokescreen. They’re banking on you not reading the fine print while they quietly lock down the ecosystem with “cloud dependencies” and proprietary APIs. Libre in name, shackled in practice. This isn’t about licenses; it’s about control. Fork the code, strip out the nonsense, and host it yourself. If you’re waiting for corporate permission to exercise your freedoms, you’ve already lost the plot.