{"id":529,"date":"2024-09-26T15:22:15","date_gmt":"2024-09-26T21:22:15","guid":{"rendered":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/?p=529"},"modified":"2024-09-26T15:22:19","modified_gmt":"2024-09-26T21:22:19","slug":"redefining-data-privacy-through-apple-intelligence","status":"publish","type":"post","link":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/2024\/09\/26\/redefining-data-privacy-through-apple-intelligence\/","title":{"rendered":"Redefining Data Privacy Through Apple Intelligence"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"571\" data-src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/09\/image-7-1024x571.png\" alt=\"\" class=\"wp-image-531 lazyload\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/09\/image-7-1024x571.png 1024w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/09\/image-7-300x167.png 300w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/09\/image-7-768x428.png 768w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/09\/image-7-1536x856.png 1536w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/09\/image-7-2048x1142.png 2048w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/09\/image-7-1568x874.png 1568w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/571;\" \/><\/figure>\n\n\n\n<p> In the latest iteration of Apple\u2019s iOS and macOS software update, Sequoia introduced the company&#8217;s very own generative AI, Apple Intelligence. With this new venture into AI, Apple hopes to provide generative AI services while maintaining a strong commitment to privacy and security (Newman, 2024). At the core of this innovation is Private Cloud Compute (PCC), a new infrastructure that extends the privacy guarantees of on-device data processing to the cloud.\u00a0 Although the previous method of limiting attackers was maintaining data within a device, incorporating cloud computing usually expands the attack&#8217;s surface, resulting in a higher risk of unintended data exposure Newman, 2024). Due to this factor, utilizing PCC architecture allows for secure processing rather than focusing on purely technical efficiency. With the help of custom Apple processors, PCC servers operate through hybrid versions of iOS and macOS, allowing for long-term data retention. Additionally, incorporating advanced security methods within these servers through the process of randomized encryption keys upon every reboot, the data is cryptographically unrecoverable after processing (Newman, 2024).\u00a0\u00a0<br><\/p>\n\n\n\n<p><strong>Data Security Through Secure Protocols in PCC<\/strong><\/p>\n\n\n\n<p>PCC prioritizes data security through secure protocols such as Secure Boot and Trusted Execution Monitor, which, at their core, prevent new code from loading once a server has been booted (Newman, 2024). Another security feature that PCC offers is removing the administrator&#8217;s emergency access. This method, which other cloud platforms do not practice, allows additional user data security. By utilizing this functionality, Apple emphasizes that access to data can be done by neither the company nor employees once processing and encryption are completed (Newman, 2024).\u00a0<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Transparency and Authenticity&nbsp;<\/strong><\/p>\n\n\n\n<p>Furthermore, to highlight its commitment to maintaining transparency, Apple has publicly made all its PCC server builds available so that the public can verify the actions that occur on PCC (Newman, 2024). Apple has also designed its cloud system so that when servers are produced, they will create a log indicating their authenticity. In addition to these safety measures, the system can distinguish between authentic PCC nodes and false nodes, which might divert information, this allows iPhones to withhold sending information to Apple Intelligence queries or data if a server build hasn&#8217;t been logged (Newman, 2024). In addition to their existing security protocols, Apple has also ushered PCC into its bug bounty program, which incentivizes external researchers to detect vulnerabilities or misconfigurations (Newman, 2024), this allows for another level of security and threat detection to be enhanced.&nbsp;<\/p>\n\n\n\n<p><br><strong>Why it matters<\/strong><br>As secure as PCC is for Apple Intelligence, Apple still has partnerships with other generative AI providers like OpenAI and Google Gemini. Since these partnerships are not included within PCC, users can manually integrate after Apple Intelligence notifies them. This allows for additional transparency and users&#8217; control over their own data(Newman, 2024).&nbsp; Apple actively tries to change the traditional interaction between user data and technology. In an age of increasing data breaches and privacy issues, Apple fosters trust with its users by maintaining transparency about its processes (Marr, 2024). Instead of relying solely on the company to safeguard user data, Apple demonstrates that its generative AI system can be utilized without invasive data collection practices (Marr, 2024).&nbsp;<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>References\u00a0<\/p>\n\n\n\n<p>Marr, B. (2024, September 11). Why Apple intelligence sets a new gold standard for AI privacy. Forbes. <a href=\"https:\/\/www.forbes.com\/sites\/bernardmarr\/2024\/09\/11\/why-apple-intelligence-sets-a-new-gold-standard-for-ai-privacy\">https:\/\/www.forbes.com\/sites\/bernardmarr\/2024\/09\/11\/why-apple-intelligence-sets-a-new-gold-standard-for-ai-privacy<\/a>\u00a0<\/p>\n\n\n\n<p>Newman, L. H. (2024, September 11). Apple intelligence promises better AI privacy. Here\u2019s how it actually works. Wired. <a href=\"https:\/\/www.wired.com\/story\/apple-private-cloud-compute-ai\/\">https:\/\/www.wired.com\/story\/apple-private-cloud-compute-ai\/<\/a>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the latest iteration of Apple\u2019s iOS and macOS software update, Sequoia introduced the company&#8217;s very own generative AI, Apple Intelligence. With this new venture into AI, Apple hopes to provide generative AI services while maintaining a strong commitment to privacy and security (Newman, 2024). At the core of this innovation is Private Cloud Compute &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/2024\/09\/26\/redefining-data-privacy-through-apple-intelligence\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Redefining Data Privacy Through Apple Intelligence&#8221;<\/span><\/a><\/p>\n","protected":false},"author":678,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-529","post","type-post","status-publish","format-standard","hentry","category-uncategorized","entry"],"featured_image_src":null,"featured_image_src_square":null,"author_info":{"display_name":"Harshad Krishnaraj","author_link":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/author\/harshad-krishnaraj\/"},"_links":{"self":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/529","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/users\/678"}],"replies":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/comments?post=529"}],"version-history":[{"count":1,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/529\/revisions"}],"predecessor-version":[{"id":532,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/529\/revisions\/532"}],"wp:attachment":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/media?parent=529"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/categories?post=529"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/tags?post=529"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}