All Vendors
platform

Deepseek

Deepseek is a platform vendor with a VRS of 80. Deploys AI-powered behavioral analysis with cross-domain tracking coordination that feeds machine learning models for visitor intent prediction.

51 IOCs1 detections1 sites
80
Vendor Risk Score

How This Briefing Works

This report opens with key findings, then maps the gaps between what Deepseek discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.

Key Findings

Key Findings

1 detection across 1 site
Disclosure Gaps

Claims vs. Observed Behavior

1 gaps

pending

UNKNOWN
They Claim

Unknown

Observed Behavior

Requires claims extraction via CDT

Customer Impact

What This Means For You

Customers visiting sites with Deepseek face AI-powered behavioral analysis that captures interaction patterns for machine learning model training. Behavioral data including scroll patterns, hesitation signals, content engagement timing, and cross-visit behavior are processed through ML algorithms to generate intent predictions. These AI-derived signals inform competitor targeting based on predicted purchase propensity rather than explicit behavioral indicators.
Recommended Actions

What To Do About It

Role-specific actions based on observed behavior

If You Use Deepseek

  • Audit Deepseek ML data collection to verify behavioral patterns are not captured for external model training
  • Disable cross-domain visitor profiling and require strict property-specific ML model isolation
  • Review DPA for AI model training data restrictions and prohibit behavioral data sharing with external ML systems
  • Implement consent-conditional Deepseek initialization to prevent pre-acceptance behavioral capture
  • Establish data retention limits to prevent long-term ML training dataset accumulation

If You're Evaluating Deepseek

  • Request Deepseek deployment without cross-domain visitor profiling or external ML model data sharing
  • Require contractual guarantee that behavioral data remains property-specific and does not train shared ML models
  • Verify Deepseek does not employ automated decision-making that affects user experience without consent
  • Assess alternative AI analytics platforms with transparent ML model governance and data isolation guarantees
  • Demand pricing concessions reflecting restricted deployment without cross-property ML training data collection

Negotiation Leverage

  • VRS 80 classification with 100% CAC subsidization justifies 40% discount if cross-domain ML training is permanently disabled
  • 60% legal tail risk from AI automated decision-making demands indemnification for GDPR Article 22 violations
  • Require contractual guarantee that behavioral data does not train ML models accessible to external demand networks
  • Request quarterly attestation that AI models remain property-specific and do not feed cross-customer intent prediction
  • Negotiate data processing transparency including ML model architecture disclosure and training data isolation verification
Runtime Detections

Runtime Detections

4 BTI-C CODES

BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.

BTI-C01Defeat Device

Evasion infrastructure, auditor bypass

Impact: Deepseek tracking infrastructure operates through background ML data collection that continues after consent rejection.

BTI-C06Behavioral Biometrics

Keystroke/mouse tracking

Impact: Mouse movements, scroll patterns, and interaction timing captured to train AI engagement prediction models.

BTI-C08Cross-Domain Sync

Identity stitching

Impact: Visitor behavior profiles synchronized across properties to build comprehensive cross-site training datasets for ML models.

BTI-C10Fingerprinting

Device identification

Impact: Browser and device fingerprinting used to reconnect visitors across sessions for longitudinal ML model training data collection.

IOC Manifest

IOC Manifest

35 INDICATORS

Indicators of compromise across 3 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.

TRACK
*www.deepseek.com/_next/static/chunks/*-*.js*
Tracking script
TRACK
*www.deepseek.com/_next/static/chunks/main-app-*.js*
Tracking script
TRACK
*www.deepseek.com/_next/static/chunks/webpack-*.js*
Tracking script
TRACK
*www.deepseek.com/_next/static/chunks/app/%5Blocale%5D/layout-*.js*
Tracking script
TRACK
*www.deepseek.com/_next/static/chunks/app/%5Blocale%5D/page-*.js*
Tracking script
TRACK
www.deepseek.com/_next/static/chunks/webpack-78074a7297337b7d.js
Auto-extracted from scan
TRACK
www.deepseek.com/_next/static/chunks/c56f180e-6001d5763de6082d.js
Auto-extracted from scan
TRACK
www.deepseek.com/_next/static/chunks/6714-6422be53e1640400.js
Auto-extracted from scan
TRACK
www.deepseek.com/_next/static/chunks/main-app-0138e63140c237ca.js
Auto-extracted from scan
TRACK
www.deepseek.com/_next/static/chunks/5073-ce61a631c4c80345.js
Auto-extracted from scan
TRACK
www.deepseek.com/_next/static/chunks/1569-d6e90e8a2b3249f7.js
Auto-extracted from scan
TRACK
www.deepseek.com/_next/static/chunks/app/%5Blocale%5D/layout-f835ebb60f3ac684.js
Auto-extracted from scan
TRACK
www.deepseek.com/_next/static/chunks/5069-6affb9693b43a1d0.js
Auto-extracted from scan
TRACK
www.deepseek.com/_next/static/chunks/app/%5Blocale%5D/page-4c4f26c6c5c1f958.js
Auto-extracted from scan
Ecosystem

Ecosystem & Supply Chain

Deepseek occupies the AI/ML layer of modern GTM stacks, typically deployed alongside analytics platforms (Google Analytics, Mixpanel), personalization engines (Optimizely, Dynamic Yield), and predictive modeling systems. The vendor creates AI-powered visitor profiling that feeds both internal intent prediction and external demand network targeting through machine learning-derived behavioral signals.
Evidence

Evidence Artifacts

Artifacts collected during analysis, available with evidence-tier access.

HAR Capture

Complete network capture with all requests and responses

IOC Manifest

51 detection signatures across scripts, domains, cookies, and network endpoints

Vendor Details