Yesterday, it was reported that Apple is set to announce its artificial intelligence strategy at the upcoming WWDC, which will be released as part of iOS 18 and other operating system updates. IT Home noted that Bloomberg had previously reported that Apple plans to use a hybrid approach combining on-device and server-side processing to implement AI functions.
However, shifting user data processing to Apple’s servers has raised privacy concerns, especially as Apple has been heavily promoting on-device processing for years. According to The Information, Apple seems to have found a solution that provides powerful AI processing capabilities in its cloud while maintaining strict privacy standards.
The Information reported that Apple plans to use “confidential computing” technology to achieve “black box processing.” Typically, cloud services encrypt data when it is stored on disk. However, for processing or transforming data on servers, it needs to be decrypted into memory.
The Information claims that Apple has found a way to maintain the privacy of user data throughout the entire processing procedure. This method is conceptually similar to “confidential computing,” an industry term meaning that data remains confidential during processing.
The report states that for the past three years, Apple has been working on a secret project internally referred to as the “Apple Data Center Chip” (ACDC), and this AI chip could help Apple achieve “black box” computing.
The Information points out that there are still potential vulnerabilities if hackers can physically access Apple’s server hardware. However, overall, this method is more secure compared to other tech giants’ approaches in the field of artificial intelligence. The system is so secure that Apple can truthfully claim it cannot access or provide any user data even when faced with subpoenas or government investigations.
However, the specifics of how this technology works remain unclear. The Information stated that it is still unknown how Apple will maintain the security model’s effectiveness when processing requests from many users simultaneously on a single chip within a data center.
Related:
- FIB Technology Overview: Principle, Use and Drawbacks
- Apple Magic Mouse Alert: Why New Is Better!
- Top AI Model Containers and How to Use Them Effectively
Disclaimer: This article is created by the original author. The content of the article represents their personal opinions. Our reposting is for sharing and discussion purposes only and does not imply our endorsement or agreement. If you have any objections, please contact us through the provided channels.