Private Cloud Compute is a cloud intelligence system that Apple designed for private artificial intelligence processing, and it's what Apple is using to keep Apple Intelligence requests secure when they need to be processed in the cloud.
Apple promised to allow security and privacy researchers to verify the end-to-end security and privacy promises that Apple made with Private Cloud Compute, and today, Apple made its Private Cloud Compute Virtual Research Environment (VRE) and other materials publicly available to all security researchers.
Apple has a Private Cloud Compute (PCC) Security Guide that details all of the components of PCC and how they work to provide privacy for cloud-based AI processing. Apple released the source code for select components of PCC that help implement its security and privacy requirements, which allows for a deeper dive into PCC.
The Virtual Research Environment is a set of tools that lets researchers perform their own security analysis on PCC using a Mac. The VRE can be used for inspecting PCC software releases, verifying the consistency of the transparency log, booting a release in a virtualized environment, and modifying and debugging PCC software for deeper investigation. The VRE can be accessed in the macOS 18.1 Developer Preview and can be used with a Mac that has an Apple silicon chip and 16GB+ unified memory.
Along with these tools, Apple is expanding its Apple Security Bounty to include rewards for vulnerabilities that demonstrate a compromise of the fundamental privacy and security guarantees of Private Cloud Compute. Security researchers who locate a vulnerability can earn up to $1 million.
This article, "Apple Shares Private Cloud Compute Virtual Research Environment, Provides Bounties for Vulnerabilities" first appeared on MacRumors.com
Discuss this article in our forums
from MacRumors: Mac News and Rumors - All Stories https://ift.tt/2fb9X1D
via IFTTT
0 Comments