Search

Apple Details Its Private Cloud Compute System, Promises Stateless Computation and Verifiable Transparency

Apple claims it has designed the Private Cloud Compute to not retain any user data post-computing.

Advertisement
Highlights
  • Apple uses Swift on Server to host the cloud-based foundation model
  • Apple said even its staff cannot access data from Private Cloud Compute
  • Private Cloud Compute is claimed to prevent specific user data targeting
Apple Details Its Private Cloud Compute System, Promises Stateless Computation and Verifiable Transparency

Apple claims it will make every production build of PCC publicly available for security research

Photo Credit: YouTube/Apple

Apple Intelligence took centre stage at this year's Worldwide Developers Conference (WWDC) 2023, highlighting new artificial intelligence (AI) features that will debut with the upcoming iOS 18, iPadOS 18, and macOS Sequoia. During the event, the tech giant revealed that some of the processing for the AI features will be done on-device and the more complex tasks will be handled by its Private Cloud Compute (PCC) system. Apple has also shared details of its PCC architecture and claimed that there is a heavy focus on data privacy and safety.

Apple shares Private Cloud Compute details

Craig Federighi, the Senior Vice President of Software Engineering at Apple, said during the event, “Your data is never stored or made accessible to Apple”. While Apple Intelligence has created a sense of curiosity among many users, some have also appeared sceptical of the company's ability to fulfil these claims. Among them was Tesla CEO Elon Musk who posted on X (formerly known as Twitter), “It's patently absurd that Apple isn't smart enough to make their own AI, yet is somehow capable of ensuring that OpenAI will protect your security & privacy!”. Notably, Apple has stated that it is using its in-house AI models for both on-device and server-based computing.

Now, Apple has shed more light on how its Private Cloud Compute will function in a blog post. Explaining the data security issues with traditional cloud servers, the tech giant claimed that it is building custom infrastructure with key changes to keep user data secure. There are three important pillars — Stateless computation, Non-targetability, and Verifiable transparency.

Private Cloud Compute's Stateless computation

Traditionally, cloud servers have a straightforward workflow. Data is pinged to the servers where the cloud computers first log it using the credentials of the user. This enables the servers to ping the information back to the user after running the task. Cloud servers also store some or all of the data to offer it to the user as backup, in case the information is requested again (due to the file being corrupt or accidental deletion). This also helps in cost optimisation as the servers do not have to compute the data again.

In contrast, Apple said that its Private Cloud Compute run “stateless data processing” where the user's device sends data to PCC for the sole purpose of fulfilling the user's inference request. It also claimed that the user data remains on the server only till it is returned to the device and “no user data is retained in any form after the response is returned.” The company added that user data is not retained even via logging or for debugging.

It also claimed that even Apple staff with privileged runtime access cannot bypass the stateless computation guarantee.

Private Cloud Compute's Non-Targetability

Cloud servers also face threats externally from hackers and bad actors who try to find vulnerabilities to breach the system. Apple said it has developed two measures to defend user data from attackers.

First, the tech giant is using the protections of Apple silicon and other connected hardware to ensure that hardware attacks would be rare. Due to Apple's experience in running cloud operations, it has developed hardware that narrows down the possibility of cyberattacks. Further, it adds that any hardware attack at scale would be both “prohibitively expensive and likely to be discovered.”

For small-scale attacks, Apple claims that its extensive revalidation at data centres (once data arrives and before it reaches cloud computers for processing) ensures that hackers cannot target the data of a specific user.

“To guard against smaller, more sophisticated attacks that might otherwise avoid detection, Private Cloud Compute uses an approach we call target diffusion to ensure requests cannot be routed to specific nodes based on the user or their content,” the tech giant added.

Private Cloud Compute's Verifiable transparency

Finally, Apple is inviting security researchers to verify the end-to-end security and privacy measures of the Private Cloud Compute system. It claimed that once PCC is launched, it will make software images of every production build of the cloud system publicly available for security research.

To further aid research, Apple will publish every production Private Cloud Compute software image for binary inspection across the OS, applications, and all other executable nodes. Researchers will be able to verify against the measurements in the transparency log. Researchers will be offered rewards for finding flaws in the system.


Is the Samsung Galaxy Z Flip 5 the best foldable phone you can buy in India right now? We discuss the company's new clamshell-style foldable handset on the latest episode of Orbital, the Gadgets 360 podcast. Orbital is available on Spotify, Gaana, JioSaavn, Google Podcasts, Apple Podcasts, Amazon Music and wherever you get your podcasts.
Affiliate links may be automatically generated - see our ethics statement for details.

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

 
Show Full Article
Please wait...
Advertisement
Popular Mobile Brands
  1. Vivo Y400 Pro 5G India Launch Today: All You Need to Know
  2. OTT Releases This Week: Ground Zero, Detective Sherdil, Found S2, and More
  3. Oppo Reno 14 5G Series Teased to Launch in India Soon
  4. Samsung Galaxy M36 5G India Launch Date and Key Features Revealed
  5. Nothing Phone 3 to Get New Glyph Matrix Interface on the Rear Panel
  6. Samsung Galaxy Z Fold 7 Leaked Renders Suggest Design Changes
  7. Vivo T4 Lite 5G to Launch in India on June 24; Chipset Confirmed
  8. Poco F7 5G to Be Equipped With a Snapdragon 8s Gen 4 SoC
  9. Microsoft Planning Thousands More Job Cuts Aimed at Salespeople
  1. Samsung Galaxy Z Fold 7 Leaked Renders Hint at Design Changes; Storage Options Tipped
  2. Vivo Y400 Pro 5G Launching Today: Price in India, Expected Features and Specifications
  3. Fast Radio Bursts Reveal Universe’s Missing Matter Hidden in Cosmic Intergalactic Fog
  4. Apollo Astronauts Found Orange Glass Beads on the Moon, Scientists Now Know Why
  5. World’s Oldest Tailored Dress Found in Egyptian Tomb Dates Back Over 5,000 Years
  6. Ancient Footprints in White Sands Confirm Humans Reached America 23,000 Years Ago
  7. Humanoid Robot Achieves Controlled Flight Using Jet Propulsion and AI Systems
  8. Curiosity Rover Reaches Uyuni Quad, Begins New Mars Mapping and Surface Analysis Campaign
  9. NASA to Gather Reentry Imagery of European Commercial Capsule Using High-Altitude Aircraft
  10. ESA's Proba-3 Unveils First-Ever Artificial Solar Eclipse Images from Precision Satellite Formation
Gadgets 360 is available in
Download Our Apps
App Store App Store
Available in Hindi
App Store
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.
Trending Products »
Latest Tech News »