Close Menu
  • Home
  • Android
  • Android Operating
  • Apple
  • Apps
  • Gadgets
  • Galaxy
  • Ipad
  • IPhone
  • Smartphone
  • Tablet

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Muse Dash, Hyperforma, Tower of Fortune 4, etc.

March 28, 2025

Best Kitchen Gadgets of 2025

March 18, 2025

The best drawing tablets of 2025: Expert tested and recommended

February 13, 2025
Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
Facebook X (Twitter) Instagram
Wtf AndroidWtf Android
  • Home
  • Android
  • Android Operating
  • Apple
  • Apps
  • Gadgets
  • Galaxy
  • Ipad
  • IPhone
  • Smartphone
  • Tablet
Wtf AndroidWtf Android
Home » Apple creates private cloud computing VMs to help researchers find bugs
Apple

Apple creates private cloud computing VMs to help researchers find bugs

adminBy adminOctober 24, 2024No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email


Apple builds virtual research environment to enable PCC testing

Apple has created a virtual research environment to allow public access to test the security of its private cloud computing systems, with several “key components” available to researchers to analyze architectural privacy and safety features. The source code has been released.

The company is also looking to improve the security of its systems, with security updates to include bounties of up to $1 million for vulnerabilities that could violate “PCC’s fundamental security and privacy guarantees.” We have expanded our bounty program.

Private Cloud Compute (PCC) is a cloud intelligence system for complex AI processing of data from user devices in a non-privacy way.

This is achieved through end-to-end encryption, which ensures that the personal data on your Apple device sent to PCC is accessible only to you, and not even Apple can observe it.

Shortly after Apple announced PCC, the company provided early access to select security researchers and auditors so they could verify the system’s privacy and security promises.

virtual research environment

In today’s blog post, Apple announced that access to PCC will be made public, allowing anyone interested to inspect how it works and see if it lives up to its promised requirements. Announced.

The company offers a “Private Cloud Compute Security Guide” that explains the architecture and technical details of the component and how it works.

Apple also offers a Virtual Research Environment (VRE) that locally replicates cloud intelligence systems for inspection, security testing, and problem exploration.

“VRE runs the PCC node software inside a virtual machine with only minor modifications. It works,” Apple explains, sharing documentation on how to set up a virtual research environment on your device.

Access private cloud computing clients from a virtual research environment
Interact with private cloud computing clients from a virtual research environment
Source: Apple

VRE is present in macOS Sequia 15.1 Developer Preview and requires devices with Apple Silica and at least 16 GB of unified memory.

Tools available in virtual environments allow you to launch PCC releases in an isolated environment, modify and debug PCC software for more thorough inspection, and run inference on demonstration models. You can.

To facilitate researchers’ work, Apple has decided to release the source code of several PCC components that implement security and privacy requirements.

  • CloudAttestation project – Responsible for building and validating certificates for PCC nodes.
  • Thinble project – Contains a privatecloudcomputed daemon that runs on the user’s device and uses CloudAttestation to enforce verifiable transparency.
  • splunkloggingd daemon – Filters potential log output from PCC nodes to prevent accidental data disclosure.
  • srd_tools project – Contains VRE tools and can be used to understand how VRE enables the execution of PCC code.

Apple is also incentivizing research with new PCC categories for security bounty programs for accidental data disclosure, user-requested external compromise, and physical or internal access.

The maximum reward is $1 million for a remote attack on request data, which results in remote code execution with arbitrary privileges.

Researchers who show how to gain access to user request data and sensitive information could receive a $250,000 reward.

Performing the same type of attack from a network with elevated privileges would result in payouts ranging from $50,000 to $150,000.

However, Apple has stated that it considers issues that significantly impact PCC for bounties, even if they fall outside of the bug bounty program categories.

The company believes that “private cloud computing is the most advanced security architecture ever deployed in large-scale cloud AI computing,” but with the help of researchers, security and We would like to further improve the privacy aspect.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

What is apple cider?

October 31, 2024

Apple announces Vision Pro rollout in two more countries

October 31, 2024

GitHub releases public preview of Apple’s Copilot for Xcode

October 31, 2024
Add A Comment
Leave A Reply Cancel Reply

Editors Picks

Will Google’s new anti-theft feature be a game-changer for Android users?

October 13, 2024

Huawei’s Android replacement HarmonyOS Next launches next week, permanently discontinuing Google’s operating system on existing devices

October 11, 2024

Android 15 lets you turn your phone into a useful smart home dashboard – here’s how

October 11, 2024

Google ordered to open Android app store to competition

October 10, 2024
Top Reviews
Wtf Android
Facebook X (Twitter) Instagram Pinterest Vimeo YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 wtfandroid. Designed by wtfandroid.

Type above and press Enter to search. Press Esc to cancel.