Comment by raw_anon_1111

Comment by raw_anon_1111 2 days ago

86 replies

I can’t think of a single company I’ve worked with as a consultant that I could convince to use DeepSeek because of its ties with China even if I explained that it was hosted on AWS and none of the information would go to China.

Even when the technical people understood that, it would be too much of a political quagmire within their company when it became known to the higher ups. It just isn’t worth the political capital.

They would feel the same way about using xAI or maybe even Facebook models.

JSR_FDED 2 days ago
  • raw_anon_1111 a day ago

    TIL: That Chinese models are considered better at multiple languages than non Chinese models.

  • tayo42 a day ago

    It's a customer service bot? And Airbnb is a vacation home booking site. It's pretty inconsequential

    • antonvs a day ago

      Airbnb has ~$12 bn annual revenue, and is a counterexample to the idea that no companies can be "convinced to use DeepSeek".

      The fact that it's customer service means it's dealing with text entered by customers, which has privacy and other consequences.

      So no, it's not "pretty inconsequential". Many more companies fit a profile like that than whatever arbitrary criteria you might have in mind for "consequential".

StealthyStart 2 days ago

This is the real cause. At the enterprise level, trust outweighs cost. My company hires agencies and consultants who provide the same advice as our internal team; this is not to imply that our internal team is incorrect; rather, there is credibility that if something goes wrong, the decision consequences can be shifted, and there is a reason why companies continue to hire the same four consulting firms. It's trust, whether it's real or perceived.

  • raw_anon_1111 2 days ago

    I have seen it much more nuanced than that.

    2020 - I was a mid level (L5) cloud consultant at AWS with only two years of total AWS experience and that was only at a small startup before then. Yet every customer took my (what in hindsight might not have been the best) advice all of the time without questioning it as long as it met their business goals. Just because I had @amazon.com as my email address.

    Late 2023 - I was the subject matter expert in a niche of a niche in AWS that the customer focused on and it was still almost impossible to get someone to listen to a consultant from a shitty third rate consulting company.

    2025 - I left the shitty consulting company last year after only a year and now work for one with a much better reputation and I have a better title “staff consultant”. I also play the game and be sure to mention that I’m former “AWS ProServe” when I’m doing introductions. Now people listen to me again.

  • 0xWTF 2 days ago

    Children do the same thing intuitively: parents continually complain that their children don't listen to them. But as soon as someone else tells them to "cover their nose", "chew with their mouth closed", "don't run with scissors", whatever, they listen and integrate that guidance into their behavior. What's harder to observe is all the external guidance they get that they don't integrate until their parents tell them. It's internal vs external validation.

    • raw_anon_1111 2 days ago

      Or in many cases they go over to their grandparents house and they let them run wild and all of the sudden your parents have “McDonald’s money” for their grandkids when they never had it for you.

      • [removed] a day ago
        [deleted]
  • coliveira 2 days ago

    So much worse for American companies. This only means that they will be uncompetitive with similar companies that use models with realistic costs.

    • raw_anon_1111 2 days ago

      I can’t think of a single major US company that is big internationally that is competing on price.

      • ipaddr 2 days ago

        Any car company. Uber.

        All tech companies offering free services.

      • re-thc a day ago

        > I can’t think of a single major US company that is big internationally that is competing on price.

        All the clouds compete on price. Do you really think it is that differentiated? Google, Amazon and Microsoft all offer special deals to sign big companies up and globally too.

tokioyoyo 2 days ago

If the Chinese model becomes better than competitors, these worries will suddenly disappear. Also, there are plenty startups and enterprises that are running fine-tuned versions of different OS models.

  • raw_anon_1111 2 days ago

    Yeah that’s not how Big Enterprise works…

    And most startups are just doing prompt engineering that will never go anywhere. The big companies will just throw a couple of developers at the feature and add it to their existing business.

    • tokioyoyo 2 days ago

      Big enterprise with mostly private companies as their clients? Lol, yeah, that’s how they work from my personal experience. The reality is, if it’s not a tech-first enterprise and already outsource part of tech to a shop outside of NA (which is almost majority at this point), they will do absolutely everything to cut the costs.

      • raw_anon_1111 2 days ago

        I spent three years working in consulting mostly in public sector and education and the last two working with startups to mid size commercial interest and a couple of financial institutions.

        Before that I spent 6 years working between 3 companies in health care in a tech lead role. I’m 100% sure that any of those companies would I have immediately questioned my judgment for suggesting DeepSeek if had been a thing.

        Absolutely none of them would ever have touched DeepSeek.

  • hhh 2 days ago

    No… Nobody I work for will touch these models. The fear is real that they have been poisoned or have some underlying bomb. Plus y’know, they’re produced by China, so they would never make it past a review board in most mega enterprises IME.

    • tokioyoyo 2 days ago

      People say that, but everyone, including enterprises, are constantly buying Chinese tech one way or another because of cost/quality ratio. There’s a tipping point in any excel file where risks don’t make sense, if the cost is 20x for the same quality.

      Of course you’ll always have exceptions (government, military and etc.), but for private, winner will take it all.

      • contrarian1234 a day ago

        The xenaphobia is still very much there. Chinese tech is sanitized through Taiwanese middlemen (Foxconn, Asus, Acer etc). If you try to use Chinese tech or funding directly you will have a lot of pushback from VCs, financial institutions and business partners. China is the boogieman

        • baq a day ago

          it is many things, but not xenophobia.

      • raw_anon_1111 2 days ago

        What Chinese built infrastructure tech where information can be exfiltrated or cause any real damage are American companies buying? Chinese communication tech is for the most part not allowed in any American technology.

    • vitaflo a day ago

      I work at a F50 company and Deepseek is one of the model that has been approved for use. Took them a bit to get it all in place but it's certainly being used in Megacorps.

    • deaux 2 days ago

      For what it's worth, this is complete insanity when practically every mega enterprises' hardware is largely Made in China.

      • raw_anon_1111 a day ago

        Enterprise hardware isn’t the issue. It’s the software. How much enterprise hardware is running with Chinese software? The US basically bans any hardware with Chinese software that can disrupt infrastructure.

    • cherioo 2 days ago

      That conversation probably gets easier if and when company when $100+M on AI.

      Companies just need to get to the “if” part first. That or they wash their hand by using a reseller that can use whatever it wants under the hood.

  • subroutine 2 days ago

    As a government contractor, using a Chinese model is a non-starter.

    • jazzyjackson 2 days ago

      I don't know that it's actually prohibited. There is no Chinese telecommunications equipment allowed, no Huawei or Bytedance, but nothing prohibiting software merely being developed in China, not yet at least.

      Although I did just check what regions AWS bedrock support Deepseek and their govcloud regions do not, so that's a good reason not to use it. Still, on prem on a segmented network, following CMMC, probably permissable

      • re-thc a day ago

        > I don't know that it's actually prohibited.

        Chinese models generally aren't but DeepSeek specifically is at this point.

        • [removed] a day ago
          [deleted]
      • apercu a day ago

        There’s nuance and debate about the 110 level 2 controls without bringing Chinese tech in to the picture. I’d love to be a fly on the wall in that meeting lol.

deaux 2 days ago

> Even when the technical people understood that

I'm not sure if technical people who don't understand this deserve the moniker technical in this context.

nylonstrung a day ago

The average person has been programmed to be distrustful of open source in general, thinking it is inferior quality or in service of some ulterior motive

register 2 days ago

That might be the perspective of a US based company. But there is also Europe and basically it's a choice between Trump and China.

  • Muromec 2 days ago

    Europe has Mistral. It feels that governments that can do things without fax take this as a sovereignity thing and roll their own or have their provider in their jurisdiction.

tehjoker 2 days ago

really a testament to how easily the us govt has spun a china bad narrative even though it is mostly fiction and american exceptionalism

  • beowulf0x0 2 days ago

    [flagged]

    • jazzyjackson 2 days ago

      Try not to accuse community members of being spies, sheesh.

      American companies chose to manufacturer in China and got all surprised Pikachu when China manufactured copies for themselves.

    • tehjoker 2 days ago

      This is how crazy and nationalistic people are getting. I'm an American citizen, though I am critical of the US government, and have no allegiances to China. What do you think America is doing to every country, even allies (which has been highly publicized)? Why would a country being constantly attacked by American intelligence and propaganda not want to counter that?

      https://www.reuters.com/world/europe/us-security-agency-spie...

      American intelligence has penetrated most information systems and at least as of 10 years ago, was leading all other nations in the level of sophistication and capability. Read Edward Snowden.

      • corimaith a day ago

        Moralizing through whataboutism does not logically follow in disproving the China threat narrative, it is axiomatic that what matters is what they are doing to us, not what we are doing to them from that vantage.

        Rather, I'd say it speaks more about how deranged the post-snowden/anti-neocon figures have become, from critiquing creeping authoritarianism to functionality acting at the behest of an even more authoritarian regime. The funny thing is that behavior of deflection, moralizing and whataboutism is exactly the kind of behavior nationalists employ, not addressing arguments head on like the so-called "American nationalists".

littlestymaar 2 days ago

> I can’t think of a single company I’ve worked with as a consultant that I could convince to use DeepSeek because of its ties with China even if I explained that it was hosted on AWS and none of the information would go to China.

Well for non-American companies, you have the choice between Chinese models that don't send data home, and American ones that do, with both countries being more or less equally threatening.

I think if Mistral can just stay close enough to the race it will win many customers by not doing anything.

siliconc0w 2 days ago

[flagged]

  • deaux 2 days ago

    > For example, a small random percentage of the time, it could add a subtle security vulnerability to any code generation.

    Now on the HN frontpage: "Google Antigravity just wiped my hard drive"

    Sure going to be hard to distinguish these Chinese models' "intentionally malicious actions"!

    And the cherry on top:

    - Written from my iPhone 16 Pro Max (Made in China)

    • raw_anon_1111 a day ago

      Where does the software come from? Your iPhone can’t magically intercept communications and send it to China without the embedded software. If Apple can’t verify the integrity of its operating system before it is installed on iPhones. There are some huge issues.

      Even if China did manage to embed software on the iPhone in Taiwan, it would soon hopefully be wiped since you usually end up updating the OS anyway as soon as you activate it.

      • adrian_b a day ago

        The hardware can always contain undetectable sub-devices that can magically intercept anything with no possibility for the software to detect this.

        You should remember that all iPhones had for several years an undetected hardware backdoor, until a couple of years ago, when independent researchers have found it and reported the Apple bugs as CVEs, so Apple was forced to fix the vulnerabilities.

        The hardware backdoor consisted in the fact that writing some magic values to some supposedly unused addresses allowed the bypassing of all memory protections. The backdoor is likely to have consisted in some memory test registers, which are used during manufacturing, but which should be disabled before shipping the phone to customers, which Apple had not done.

        This hardware backdoor, coupled with some bugs in a few Apple system libraries, allowed the knowledgeable attackers to send remotely an invisible message to the iPhone, which was able to take complete control over the iPhone, allowing the attacker to read any file and to record from cameras and microphones. A reboot of the iPhone removed the remote control, but then the attacker would immediately send another invisible message, regaining control.

        There was no way to detect that the iPhone was remotely controlled. The backdoor was discovered only externally in the firewalls of a company, because the iPhones generated a suspiciously high amount of Internet traffic, without apparent causes.

        This has been widely reported at the time and discussed on HN, but some people continue to be not aware about how little you can trust even major companies like Apple to deliver the right hardware.

        The identity of the attackers who exploited this Apple hardware backdoor has not been revealed, but it is likely that they had needed the cooperation of Apple insiders, at least for access to secret Apple documentation, if not for intentionally ensuring that the hardware backdoor remained open.

        Thus the fact that Apple publishes only incomplete technical documentation has helped only the attackers, allowing them to remain undiscovered for many years, against the interests of the Apple customers. Had the specifications of the test registers been public, someone would have quickly discovered that they had remained unprotected after production.

        Therefore, for many years the iPhones of certain valuable targets had magically intercepted all their communications and they have sent them to an unknown country (due to the nature of some of the identified targets and the amount of resources required to carry the attacks, it has been speculated that the country could have been Israel, but no public evidence exists; a US TLA is the main plausible alternative, as some targets were Russians).

        • raw_anon_1111 a day ago

          The argument was that you couldn’t trust American designed hardware running American designed software because it was built in China. All theories suggest that the security vulnerabilities were caused by Apple and had nothing to do with Chinese manufacturers

  • nagaiaida 2 days ago

    on what hypothetical grounds would you be more meaningfully able to sue the american maker of a self-hosted statistical language model that you select your own runtime sampling parameters for after random subtle security vulnerabilities came out the other side when you asked it for very secure code?

    put another way, how do you propose to tell this subtle nefarious chinese sabotage you baselessly imply to be commonplace from the very real limitations of this technology in the first place?

    • fragmede 2 days ago

      This paper may be of interest to you: https://arxiv.org/html/2504.15867v1

      • nagaiaida 2 days ago

        the mechanism of action for that attack appears to be reading from poisoned snippets on stackoverflow or a similar site, which to my mind is an excellent example of why it seems like it would be difficult to retroactively pin "insecure code came out of my model" on the evil communist base weights of the model in question

    • kriops 2 days ago

      [flagged]

      • nagaiaida 2 days ago

        sorry, is your contention here "spurious accusations don't require evidence when aimed at designated state enemies"? because it feels uncharitably rude to infer that's what you meant to say here, but i struggle to parse this in a different way where you say something more reasonable.

      • coliveira 2 days ago

        Competitor != adversary. It is US warmongering ideology that tries to equate these concepts.

      • saubeidl 2 days ago

        [flagged]

        • kriops 2 days ago

          The EU isn’t a state and has no military or police. As such the EU’s existence is an anecdotal answer to your question in itself: Reliance on (in particular maritime) trade. And yes, China also benefits from trade, but as opposed to democracies (in which the general populace to a greater extent are keys to power) the state does not require trade to sustain itself in the same way.

          This makes EU countries more reliable partners for cooperation than China. The same goes for the US from an European perspective, and even with everything going on over there it is still not remotely close.

          All states are fundamentally adversaries because they have conflicting interests. To your point however, adversaries do indeed cooperate all the time.

  • nylonstrung a day ago

    Literally every time a Chinese model is discussed here we get this completely braindead take

    There has never been a shred of evidence for security researchers, model analysis, benchmarks, etc that supports this.

    It's a complete delusion in every sense.