Apple erstellt Private Cloud Compute VM, damit Forscher Bugs finden können

Teilen:

Apple created a Virtual Research Environment to allow public access to testing the security of its Private Cloud Compute system, and released the source code for some “key components” to help researchers analyze the privacy and safety features on the architecture.

The company also seeks to improve the system’s security and has expanded its security bounty program to include rewards of up to $1 million for vulnerabilities that could compromise “the fundamental security and privacy guarantees of PCC.”

Private Cloud Compute (PCC) is a cloud intelligence system for complex AI processing of data from user devices in a way that does not compromise privacy.

This is achieved through end-to-end encryption, to ensure that personal data from Apple devices sent to PCC is accessible only to the user and not even Apple can observe it.

Shortly after Apple announced PCC, the company gave early access to select security researchers and auditors so they could verify the privacy and security promises for the system.

Virtual Research Environment

In a blog post today, Apple announces that access to PCC is now public and anyone curious can inspect how it works and check if it rises to the promised claims.

The company makes available the Private Cloud Compute Security Guide, which explains the architecture and technical details of the components and the way they work.

Apple also provides a Virtual Research Environment (VRE), which replicates locally the cloud intelligence system and allows inspecting it as well as testing its security and hunting for issues.

“The VRE runs the PCC node software in a virtual machine with only minor modifications. Userspace software runs identically to the PCC node, with the boot process and kernel adapted for virtualization,” Apple explains, sharing documentation on how to set up the Virtual Research Environment on your device.

Accessing the Private Cloud Compute client from the Virtual Research Environment
Interacting with the Private Cloud Compute client from the Virtual Research Environment
source: Apple

VRE is present on macOS Sequia 15.1 Developer Preview and it needs a device with Apple silicaon and at least 16GB of unified memory.

The tools available in the virtual environment allow booting a PCC release in an isolated environment, modifying and debugging the PCC software for a more thorough scrutiny, and perform inference against demonstration models.

To make it easier for researchers, Apple decided to release the source code for some PCC components that implement security and privacy requirements:

  • The CloudAttestation project – responsible for constructing and validating the PCC node’s attestations.
  • The Thimble project – includes the privatecloudcomputed daemon that runs on a user’s device and uses CloudAttestation to enforce verifiable transparency.
  • The splunkloggingd daemon – filters the logs that can be emitted from a PCC node to protect against accidental data disclosure.
  • The srd_tools project – contains the VRE tooling and can be used to understand how the VRE enables running the PCC code.

Apple also incentivizes research with new PCC categories in its security bounty program for accidental data disclosure, external compromise from user requests, and physical or internal access.

The highest reward is $1 million for a remote attack on request data, which achieves remote code execution with arbitrary entitlements.

For showing how to obtain access to a user’s request data or sensitive info, a researcher can get a bounty of $250,000.

Demonstrating the same type of attack, but from the network with elevated privileges, comes with a payment between $50,000 and $150,000.

However, Apple says that it considers for rewards any issues that have a significant impact on PCC, even if they are outside the categories in its bug bounty program.

The company believes that its “Private Cloud Compute is the most advanced security architecture ever deployed for cloud AI compute at scale” but still hopes to improve it further in terms of security and privacy with the help of researchers.

Ionut Ilascu

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
7:38 pm, Juni 12, 2025
Wetter-Symbol 24°C
L: 23° | H: 25°
wenige Wolken
Luftfeuchtigkeit: 65 %
Druck: 1013 mb
Wind: 12 mph SSW
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 20%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 4:43 am
Sonnenuntergang: 9:17 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
23° | 25°°C 0 mm 0% 4 mph 68 % 1014 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
16° | 27°°C 1 mm 100% 7 mph 94 % 1019 mb 0 mm/h
Sa. Juni 14 10:00 pm
Wetter-Symbol
17° | 23°°C 1 mm 100% 13 mph 96 % 1019 mb 0 mm/h
So. Juni 15 10:00 pm
Wetter-Symbol
13° | 22°°C 0.46 mm 46% 10 mph 84 % 1025 mb 0 mm/h
Mo. Juni 16 10:00 pm
Wetter-Symbol
14° | 25°°C 0 mm 0% 7 mph 86 % 1027 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
20° | 23°°C 0 mm 0% 4 mph 68 % 1014 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
17° | 19°°C 0 mm 0% 3 mph 75 % 1015 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
16° | 16°°C 0 mm 0% 3 mph 84 % 1017 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
18° | 18°°C 0 mm 0% 7 mph 79 % 1018 mb 0 mm/h
Tomorrow 10:00 am
Wetter-Symbol
22° | 22°°C 0 mm 0% 7 mph 60 % 1019 mb 0 mm/h
Tomorrow 1:00 pm
Wetter-Symbol
26° | 26°°C 0 mm 0% 6 mph 41 % 1019 mb 0 mm/h
Tomorrow 4:00 pm
Wetter-Symbol
27° | 27°°C 0 mm 0% 7 mph 40 % 1019 mb 0 mm/h
Tomorrow 7:00 pm
Wetter-Symbol
25° | 25°°C 0 mm 0% 1 mph 51 % 1018 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€93,005.32
-0.72%
Ethereum(ETH)
€2,356.45
-2.96%
Fesseln(USDT)
€0.86
0.01%
XRP(XRP)
€1.93
-2.79%
Solana(SOL)
€136.36
-3.29%
USDC(USDC)
€0.86
0.00%
Dogecoin(DOGE)
€0.161639
-4.76%
Shiba Inu(SHIB)
€0.000011
-5.15%
Pepe(PEPE)
€0.000010
-5.87%
Peanut das Eichhörnchen(PNUT)
€0.236997
-5.02%
Nach oben scrollen