WWDC: Apple’s Exclusive Cloud Calculation is the exemplar for all cloud services

Your device determines whether it can handle the request autonomously.
If additional computational power is needed, support will be obtained from PCC.

[…Keep reading]

WWDC: Apple's Private Cloud Compute is what all cloud services should be

Your device determines whether it can handle the request autonomously.

If additional computational power is needed, support will be obtained from PCC.

In this process, the request is directed through an Unaware HTTP (OHTTP) relay managed by an external third party, which helps shield the IP address of the originating request.

Only relevant data pertaining to your task will be transmitted to the PCC servers.

There is no storage of your data at any stage, including in server statistics or error records; it is not reachable; and is eradicated once the request is completed.

This also implies no data retention (differing from any other cloud provider), no privileged access, and concealed user identity.

Apple has demonstrably taken significant strides in safeguarding its users against targeting. Unauthorized intruders are unable to access data belonging to a specific Private Cloud user without compromising the entire PCC system. This defense not only applies to remote assaults, but also to efforts made on-premises, for instance, if an invader has infiltrated the data center. This blocks the ability to seize database credentials for launching an assault.

What about the hardware?

Apple has furthermore made the whole system amenable to external security and privacy assessment — indeed, unless the server declares its openness to such appraisal, the information will not be exchanged — hence, no spurious PCC for you. 

The company didn’t conclude its efforts there. “We reinforce the inherent protections of Apple Silicon with a solidified supply chain for PCC hardware, making large-scale hardware assaults both cost-prohibitive and likely to be detected,” stated the company. “Private Cloud Calculate hardware security starts at production, where we catalog and perform close-up imaging of the elements of the PCC node before each server is sealed and its tamper-proof switch is enacted.”

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.