AI Data Secured by Apple with Confidential Computing

Apple announces that its AI servers will leverage confidential computing technology for enhanced data security and processing.
AI Data Secured by Apple with Confidential Computing

Table of Contents

Yesterday, it was reported that Apple is set to announce its artificial intelligence strategy at the upcoming WWDC, which will be released as part of iOS 18 and other operating system updates. IT Home noted that Bloomberg had previously reported that Apple plans to use a hybrid approach combining on-device and server-side processing to implement AI functions.

However, shifting user data processing to Apple’s servers has raised privacy concerns, especially as Apple has been heavily promoting on-device processing for years. According to The Information, Apple seems to have found a solution that provides powerful AI processing capabilities in its cloud while maintaining strict privacy standards.

The Information reported that Apple plans to use “confidential computing” technology to achieve “black box processing.” Typically, cloud services encrypt data when it is stored on disk. However, for processing or transforming data on servers, it needs to be decrypted into memory.

The Information claims that Apple has found a way to maintain the privacy of user data throughout the entire processing procedure. This method is conceptually similar to “confidential computing,” an industry term meaning that data remains confidential during processing.

The report states that for the past three years, Apple has been working on a secret project internally referred to as the “Apple Data Center Chip” (ACDC), and this AI chip could help Apple achieve “black box” computing.

The Information points out that there are still potential vulnerabilities if hackers can physically access Apple’s server hardware. However, overall, this method is more secure compared to other tech giants’ approaches in the field of artificial intelligence. The system is so secure that Apple can truthfully claim it cannot access or provide any user data even when faced with subpoenas or government investigations.

However, the specifics of how this technology works remain unclear. The Information stated that it is still unknown how Apple will maintain the security model’s effectiveness when processing requests from many users simultaneously on a single chip within a data center.

Related:

  1. FIB Technology Overview: Principle, Use and Drawbacks
  2. Apple Magic Mouse Alert: Why New Is Better!
  3. Top AI Model Containers and How to Use Them Effectively
End-of-DiskMFR-blog

Disclaimer: This article is created by the original author. The content of the article represents their personal opinions. Our reposting is for sharing and discussion purposes only and does not imply our endorsement or agreement. If you have any objections, please contact us through the provided channels.

DiskMFR Field Sales Manager - Leo

It’s Leo Zhi. He was born on August 1987. Major in Electronic Engineering & Business English, He is an Enthusiastic professional, a responsible person, and computer hardware & software literate. Proficient in NAND flash products for more than 10 years, critical thinking skills, outstanding leadership, excellent Teamwork, and interpersonal skills.  Understanding customer technical queries and issues, providing initial analysis and solutions. If you have any queries, Please feel free to let me know, Thanks

Please let us know what you require, and you will get our reply within 24 hours.









    Our team will answer your inquiries within 24 hours.
    Your information will be kept strictly confidential.

    • Our team will answer your inquiries within 24 hours.
    • Your information will be kept strictly confidential.

    Let's Have A Chat

    Learn How We Served 100+ Global Device Brands with our Products & Get Free Sample!!!

    Email Popup Background 2