So Apple has introduced a new system called “Private Cloud Compute” that allows your phone to offload complex (typically AI) tasks to specialized secure devices in the cloud. I’m still trying to work out what I think about this. So here’s a thread. 1/
Apple, unlike most other mobile providers, has traditionally done a lot of processing on-device. For example, all of the machine learning and OCR text recognition on Photos is done right on your device. 2/
The problem is that while modern phone “neural” hardware is improving, it’s not improving fast enough to take advantage of all the crazy features Silicon Valley wants from modern AI, including generative AI and its ilk. This fundamentally requires servers. 3/
But if you send your tasks out to servers in “the cloud” (god using quotes makes me feel 80), this means sending incredibly private data off your phone and out over the Internet. That exposes you to spying, hacking, and the data hungry business model of Silicon Valley. 4/
The solution Apple has come up with is to try to build secure and trustworthy hardware in their own data centers. Your phone can then “outsource” heavy tasks to this hardware. Seems easy, right? Well: here’s the blog post. 5/security.apple.com/blog/private-c…
TL;DR: it is not easy. Building trustworthy computers is literally the hardest problem in computer security. Honestly it’s almost the only problem in computer security. But while it remains a challenging problem, we’ve made a lot of advances. Apple is using almost all of them. 6/
The first thing Apple is doing is using all the advances they’ve made in building secure phones and PCs in their new servers. This involves using Secure Boot and a Secure Enclave Processor (SEP) to hold keys. They’ve presumably turned on all the processor security features. 7/
Then they’re throwing all kinds of processes at the server hardware to make sure the hardware isn’t tampered with. I can’t tell if this prevents hardware attacks, but it seems like a start. 8/
They also use a bunch of protections to ensure that software is legitimate. One is that the software is “stateless” and allegedly doesn’t keep information between user requests. To help ensure this, each server/node reboot re-keys and wipes all storage. 9/
A second protection is that the operating system can “attest” to the software image it’s running. Specifically, it signs a hash of the software and shares this with every phone/client. If you trust this infrastructure, you’ll know it’s running a specific piece of software. 10/
Of course, knowing that the phone is running a specific piece of software doesn’t help you if you don’t trust the software. So Apple plans to put each binary image into a “transparency log” and publish the software.
But here’s a sticky point: not with the full source code. 11/
Security researchers will get *some code* and a VM they can use to run the software. They’ll then have to reverse-engineer the binaries to see if they’re doing unexpected things. It’s a little suboptimal. 12/
When your phone wants to outsource a task, it will contact Apple and obtain a list of servers/nodes and their keys. It will then encrypt its request to all servers, and one will process it. They’re even using fancy anonymous credentials and a third part relay to hide your IP. 13/
Ok there are probably half a dozen more technical details in the blog post. It’s a very thoughtful design. Indeed, if you gave an excellent team a huge pile of money and told them to build the best “private” cloud in the world, it would probably look like this. 14/
But now the tough questions. Is it a good idea? And is it as secure as what Apple does today? And most importantly:
I admit that as I learned about this feature, it made me kind of sad. The thought that was going through my head was: this is going to be too much of a temptation. Once you can “safely” outsource tasks to the cloud, why bother doing them locally. Outsource everything!
As best I can tell, Apple does not have explicit plans to announce when your data is going off-device for to Private Compute. You won’t opt into this, you won’t necessarily even be told it’s happening. It will just happen. Magically.
I don’t love that part. 17/
Finally, there are so many invisible sharp edges that could exist in a system like this. Hardware flaws. Issues with the cryptographic attenuation framework. Clever software exploits. Many of these will be hard for security researchers to detect. That worries me too. 18/
Wrapping up on a more positive note: it’s worth keeping in mind that sometimes the perfect is the enemy of the really good.
In practice the alternative to on-device is: ship private data to OpenAI or someplace sketchier, where who knows what might happen to it. 19/
And of course, keep in mind that super-spies aren’t your biggest adversary. For many people your biggest adversary is the company who sold you your device/software. This PCC system represents a real commitment by Apple not to “peek” at your data. That’s a big deal. 20/
In any case, this is the world we’re moving to. Your phone might seem to be in your pocket, but a part of it lives 2,000 miles away in a data center. As security folks we probably need to get used to that fact, and do the best we can to make sure all parts are secure. //fin
Addendum: “cryptographic attenuation” should read “cryptographic attestation”, but I’m sure folks will get the point.
• • •
Missing some Tweet in this thread? You can try to
force a refresh
There’s been some reporting that Meta contributed an unfathomable sum to promote age verification laws globally. This is broadly true, but actual situation is a bit more complex. Figured it was worth an update.
The original reporting was OSINT-style reporting: on Reddit and a site (tboteproject.com) but most of it subsequently disappeared. Claimed $2 BN spent, which is an awful lot. An archived version is here: web.archive.org/web/2026031409…
So this reporting is gone, but some of the details are verifiable. Meta did verifiably spend significant sums backing a US bill called the “App Store Accountability” act. Here’s some Bloomberg reporting, which you probably can’t read. bloomberg.com/news/articles/…
“Ghost participants” have been floating around for years as a way to break encrypted messaging. The idea is to add invisible extra people (the police, essentially) to group chats. It’s a dumb idea, and let me explain why.
First, the original idea was proposed by two GCHQ experts (the UK’s equivalent of NSA). For details of their proposal, I wrote about it when they put it forward in 2018. The idea has two components. /1 blog.cryptographyengineering.com/2018/12/17/on-…
First, the observation is that most encrypted messaging apps support group messaging. So a conversation with two people can be easily extended into a group of 3, a group of 10 into a group of 11, etc. So it’s “easy” to add an extra person to most conversations. /2
Meta appears to be reversing its strong stance on encryption. The first obvious casualty is that they’re abandoning and disabling end-to-end encryption in Instagram DMs.
A big tell is the statement by Meta in this article: “very few people were opting in.” Meta knows opt-in encryption doesn’t get adoption, which is why their original strategy was to make encryption on by *default* in WhatsApp, Messenger and their other products.
For those who don’t have context, Bitlocker is the built-in drive encryption in Windows. This is supposed to protect the data on your machine from being accessed without authorization. In many configurations, Windows will upload a recovery key to your Microsoft cloud account.
The problem is that these recovery keys aren’t encrypted end-to-end in a way that Microsoft can’t access. So if law enforcement wants to access your encrypted drive (even without knowing your password) they can just ask Microsoft for the key. And Microsoft will hand it over.
Globally, state after state is hurtling towards digital surveillance just at a time when we need to be having a discussion about how to protect ourselves from the surveillance capabilities of the future. Here, Switzerland. tuta.com/blog/switzerla…
There are many problems with these ideas, not the least of which is that we’re asking for-profit companies to collect even more identifying information on users — information that (even if you fully trust the government) could end up breached or sold.
What I don’t understand about all of these plans (UK, Switzerland, the EU) is the absolute mad rush. Is there a crisis of dangerous crime suddenly in 2025 that needs to be addressed immediately, at any cost to privacy? We can’t wait a few years for safer technology?
The “age verification” and the “human identification” problem are the same problem. It upsets me to be around people who think they’re working on the first, but don’t understand they’re actually working on the second.
To be really clear: it’s pretty obvious that the central (Internet communication) problem of our time is going to be determining whether the stranger you’re talking to (or delivering ads to) is a person or a bot. And every existing tech we have for doing this will fail.
So how do we do this? Presumably by tightly binding physical identity to your device and then proving possession (with some other bells and whistles). Not coincidentally that’s exactly what age verification is. Weird how corporate and gov’t priorities suddenly align, right?