GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Conversation

Notices

  1. Embed this notice
    Matthew Green (matthew_d_green@ioc.exchange)'s status on Wednesday, 12-Jun-2024 03:14:00 JST Matthew Green Matthew Green

    So Apple has introduced a new system called “Private Cloud Compute” that allows your phone to offload complex (typically AI) tasks to specialized secure devices in the cloud. I’m still trying to work out what I think about this. So here’s a thread. 1/

    In conversation about a year ago from ioc.exchange permalink
    • Embed this notice
      Matthew Green (matthew_d_green@ioc.exchange)'s status on Wednesday, 12-Jun-2024 03:13:50 JST Matthew Green Matthew Green
      in reply to

      As best I can tell, Apple does not have explicit plans to announce when your data is going off-device for to Private Compute. You won’t opt into this, you won’t necessarily even be told it’s happening. It will just happen. Magically.

      I don’t love that part. 17/

      In conversation about a year ago permalink
    • Embed this notice
      Matthew Green (matthew_d_green@ioc.exchange)'s status on Wednesday, 12-Jun-2024 03:13:51 JST Matthew Green Matthew Green
      in reply to

      Quick intermission: I also posted this thread on Twitter, and then this happened right about this part. It was… uncomfortable.

      In conversation about a year ago permalink

      Attachments


      1. https://files.ioc.exchange/media_attachments/files/112/597/917/214/346/212/original/449fcab95e4360c7.png
    • Embed this notice
      Matthew Green (matthew_d_green@ioc.exchange)'s status on Wednesday, 12-Jun-2024 03:13:51 JST Matthew Green Matthew Green
      in reply to

      Back to the substance.

      I admit that as I learned about this feature, it made me kind of sad. The thought that was going through my head was: this is going to be too much of a temptation. Once you can “safely” outsource tasks to the cloud, why bother doing them locally. Outsource everything! 16/

      In conversation about a year ago permalink
      this.ven repeated this.
    • Embed this notice
      Matthew Green (matthew_d_green@ioc.exchange)'s status on Wednesday, 12-Jun-2024 03:13:52 JST Matthew Green Matthew Green
      in reply to

      Ok there are probably half a dozen more technical details in the blog post. It’s a very thoughtful design. Indeed, if you gave an excellent team a huge pile of money and told them to build the best “private” cloud in the world, it would probably look like this. 14/

      In conversation about a year ago permalink
    • Embed this notice
      Matthew Green (matthew_d_green@ioc.exchange)'s status on Wednesday, 12-Jun-2024 03:13:52 JST Matthew Green Matthew Green
      in reply to

      But now the tough questions. Is it a good idea? And is it as secure as what Apple does today? And most importantly: can users opt out of this thing? 14/

      In conversation about a year ago permalink
    • Embed this notice
      Matthew Green (matthew_d_green@ioc.exchange)'s status on Wednesday, 12-Jun-2024 03:13:54 JST Matthew Green Matthew Green
      in reply to

      Security researchers will get *some code* and a VM they can use to run the software. They’ll then have to reverse-engineer the binaries to see if they’re doing unexpected things. It’s a little suboptimal. 12/

      In conversation about a year ago permalink
    • Embed this notice
      Matthew Green (matthew_d_green@ioc.exchange)'s status on Wednesday, 12-Jun-2024 03:13:54 JST Matthew Green Matthew Green
      in reply to

      When your phone wants to outsource a task, it will contact Apple and obtain a list of servers/nodes and their keys. It will then encrypt its request to all servers, and one will process it. They use a load balancer to make sure no single server processes all your requests. They’re even using fancy anonymous credentials and a third part relay to hide your IP. 13/

      In conversation about a year ago permalink

      Attachments


      1. https://files.ioc.exchange/media_attachments/files/112/597/900/227/789/198/original/9a98b51da014b3f3.png
    • Embed this notice
      Matthew Green (matthew_d_green@ioc.exchange)'s status on Wednesday, 12-Jun-2024 03:13:55 JST Matthew Green Matthew Green
      in reply to

      Of course, knowing that the phone is running a specific piece of software doesn’t help you if you don’t trust the software. So Apple plans to put each binary image into a “transparency log” and publish the software.

      But here’s a sticky point: not with the full source code. 11/

      In conversation about a year ago permalink

      Attachments


      1. https://files.ioc.exchange/media_attachments/files/112/597/892/522/517/934/original/8bc0592ed582ef40.png
    • Embed this notice
      Matthew Green (matthew_d_green@ioc.exchange)'s status on Wednesday, 12-Jun-2024 03:13:56 JST Matthew Green Matthew Green
      in reply to

      They also use a bunch of protections to ensure that software is legitimate. One is that the software is “stateless” and allegedly doesn’t keep information between user requests. To help ensure this, each server/node reboot re-keys and wipes all storage. 9/

      In conversation about a year ago permalink

      Attachments


      1. https://files.ioc.exchange/media_attachments/files/112/597/887/995/416/009/original/88805507fa09e597.png
    • Embed this notice
      Matthew Green (matthew_d_green@ioc.exchange)'s status on Wednesday, 12-Jun-2024 03:13:56 JST Matthew Green Matthew Green
      in reply to

      A second protection is that the operating system can “attest” to the software image it’s running. Specifically, it signs a hash of the software and shares this with every phone/client. If you trust this infrastructure, you’ll know it’s running a specific piece of software. 10/

      In conversation about a year ago permalink
    • Embed this notice
      Matthew Green (matthew_d_green@ioc.exchange)'s status on Wednesday, 12-Jun-2024 03:13:57 JST Matthew Green Matthew Green
      in reply to

      The first thing Apple is doing is using all the advances they’ve made in building secure phones and PCs in their new servers. This involves using Secure Boot and a Secure Enclave Processor (SEP) to hold keys. They’ve presumably turned on all the processor security features. 7/

      In conversation about a year ago permalink
    • Embed this notice
      Matthew Green (matthew_d_green@ioc.exchange)'s status on Wednesday, 12-Jun-2024 03:13:57 JST Matthew Green Matthew Green
      in reply to

      Then they’re throwing all kinds of processes at the server hardware to make sure the hardware isn’t tampered with. I can’t tell if this prevents hardware attacks, but it seems like a start. 8/

      In conversation about a year ago permalink

      Attachments


      1. https://files.ioc.exchange/media_attachments/files/112/597/885/284/068/302/original/6b3e26c8573d7b33.png
    • Embed this notice
      Matthew Green (matthew_d_green@ioc.exchange)'s status on Wednesday, 12-Jun-2024 03:13:58 JST Matthew Green Matthew Green
      in reply to

      The solution Apple has come up with is to try to build secure and trustworthy hardware in their own data centers. Your phone can then “outsource” heavy tasks to this hardware. Seems easy, right? Well: here’s the blog post. https://security.apple.com/blog/private-cloud-compute/ 5/

      In conversation about a year ago permalink

      Attachments

      1. Domain not in remote thumbnail source whitelist: security.apple.com
        Blog - Private Cloud Compute: A new frontier for AI privacy in the cloud - Apple Security Research
        Secure and private AI processing in the cloud poses a formidable new challenge. To support advanced features of Apple Intelligence with larger foundation models, we created Private Cloud Compute (PCC), a groundbreaking cloud intelligence system designed specifically for private AI processing. Built with custom Apple silicon and a hardened operating system, Private Cloud Compute extends the industry-leading security and privacy of Apple devices into the cloud, making sure that personal user data sent to PCC isn’t accessible to anyone other than the user — not even to Apple. We believe Private Cloud Compute is the most advanced security architecture ever deployed for cloud AI compute at scale.
    • Embed this notice
      Matthew Green (matthew_d_green@ioc.exchange)'s status on Wednesday, 12-Jun-2024 03:13:58 JST Matthew Green Matthew Green
      in reply to

      TL;DR: it is not easy. Building trustworthy computers is literally the hardest problem in computer security. Honestly it’s almost the only problem in computer security. But while it remains a challenging problem, we’ve made a lot of advances. Apple is using almost all of them. 6/

      In conversation about a year ago permalink
    • Embed this notice
      Matthew Green (matthew_d_green@ioc.exchange)'s status on Wednesday, 12-Jun-2024 03:13:59 JST Matthew Green Matthew Green
      in reply to

      The problem is that while modern phone “neural” hardware is improving, it’s not improving fast enough to take advantage of all the crazy features Silicon Valley wants from modern AI, including generative AI and its ilk. This fundamentally requires servers. 3/

      In conversation about a year ago permalink
    • Embed this notice
      Matthew Green (matthew_d_green@ioc.exchange)'s status on Wednesday, 12-Jun-2024 03:13:59 JST Matthew Green Matthew Green
      in reply to

      But if you send your tasks out to servers in “the cloud” (god using quotes makes me feel 80), this means sending incredibly private data off your phone and out over the Internet. That exposes you to spying, hacking, and the data hungry business model of Silicon Valley. 4/

      In conversation about a year ago permalink
    • Embed this notice
      Matthew Green (matthew_d_green@ioc.exchange)'s status on Wednesday, 12-Jun-2024 03:14:00 JST Matthew Green Matthew Green
      in reply to

      Apple, unlike most other mobile providers, has traditionally done a lot of processing on-device. For example, all of the machine learning and OCR text recognition on Photos is done right on your device. 2/

      In conversation about a year ago permalink

      Attachments


      1. https://files.ioc.exchange/media_attachments/files/112/597/853/513/894/863/original/4e1cea7ba41b5929.png

      2. https://files.ioc.exchange/media_attachments/files/112/597/853/904/664/093/original/88c5e2bdda3726d1.png

Feeds

  • Activity Streams
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.