DeepSeek just gave away an AI model that rivals GPT-5 – and it could change everything

TechRadarTuesday, December 2, 2025 at 11:22:56 AM
PositiveTechnology
DeepSeek just gave away an AI model that rivals GPT-5 – and it could change everything
  • DeepSeek has launched an open
  • The introduction of DeepSeek's model could democratize access to advanced AI capabilities, allowing smaller companies and developers to leverage powerful tools without the prohibitive costs associated with existing models like GPT
  • However, the release of DeepSeek's model raises concerns about security, particularly regarding its handling of politically sensitive topics, which has been flagged by experts. This duality of potential and risk reflects ongoing debates in the AI community about the balance between innovation and ethical considerations.
— via World Pulse Now AI Editorial System

Was this article worth reading? Share it

Recommended apps based on your readingExplore all apps
Continue Readings
The new paradigm: a concentration of data in AI demands greater vigilance
NeutralTechnology
The increasing concentration of data in artificial intelligence (AI) necessitates heightened vigilance from enterprises, particularly during the data processing phase when information is loaded into memory. This critical moment poses significant risks that organizations must address to safeguard their operations.
Mistral launches Mistral 3, a family of open models designed to run on laptops, drones, and edge devices
PositiveTechnology
Mistral AI has launched the Mistral 3 family, a suite of 10 open-source models designed for diverse applications, including smartphones, drones, and enterprise systems. This release represents a significant advancement in Mistral's efforts to compete with major tech players like OpenAI and Google, as well as emerging competitors from China.
Sam Altman calls a ‘code red’ for ChatGPT – here’s what it will mean for you
NeutralTechnology
Sam Altman has declared a 'code red' for ChatGPT, emphasizing the urgent need to enhance the user experience of the AI platform. This announcement comes amid growing concerns regarding the psychological impacts of AI interactions, particularly as some users have reported distress and negative effects from recent changes to the system.
4.3 million have installed this malicious browser extension on Chrome and Edge - here's how to check
NegativeTechnology
A malicious browser extension has been installed by 4.3 million users on Chrome and Edge, posing significant security risks after five years of operation. This extension has been flagged for compromising user data and privacy, highlighting the vulnerabilities associated with browser extensions.
107 Android flaws just got patched by Google - here's how to make sure you're up to date
NegativeTechnology
Google has patched 107 vulnerabilities in Android, including two that are actively exploited by state-sponsored actors, highlighting significant security concerns for users.
Syntax hacking: Researchers discover sentence structure can bypass AI safety rules
NeutralTechnology
Researchers have discovered that certain sentence structures can bypass AI safety rules, shedding light on the mechanics behind successful prompt injection attacks. This finding raises concerns about the robustness of current AI safety protocols and the potential for misuse in various applications.
Glassworm returns once again with a third round of VS code attacks
NegativeTechnology
Glassworm has launched a third wave of attacks targeting users of the Visual Studio Marketplace and the Open VSX Registry with infostealing malware. This resurgence of cyber threats emphasizes the ongoing vulnerabilities within popular software platforms, which are increasingly exploited by malicious actors.
Tor adds another layer to the onion with a new relay encryption algorithm - boosting resilience and security across the board
PositiveTechnology
Tor has introduced a new relay encryption algorithm, CGO, replacing the older tor1 system to enhance privacy and security. This upgrade aims to prevent tagging attacks and modernize authentication processes across its network of circuits.