Introduction
Introduction Statistics Contact Development Disclaimer Help
Post AipJaotcmV4ZPHk1a4 by [email protected]
More posts by [email protected]
Post #Aiok8tbUBlihVECreS by [email protected]
0 likes, 3 repeats
So Apple has introduced a new system called “Private Cloud Compute” that al…
Post #Aiok8unvizGhE72Jge by [email protected]
0 likes, 0 repeats
Apple, unlike most other mobile providers, has traditionally done a lot of proc…
Post #Aiok8w0jEt6Gy623H6 by [email protected]
0 likes, 0 repeats
The problem is that while modern phone “neural” hardware is improving, it�…
Post #Aiok8xConQMgfshDl2 by [email protected]
0 likes, 1 repeats
But if you send your tasks out to servers in “the cloud” (god using quotes …
Post #Aiok8yMmTrvcH4MgvQ by [email protected]
0 likes, 1 repeats
The solution Apple has come up with is to try to build secure and trustworthy h…
Post #Aiok8zYA52crwehIIq by [email protected]
0 likes, 1 repeats
TL;DR: it is not easy. Building trustworthy computers is literally the hardest …
Post #Aiok90ZcH7Nr7SNyD2 by [email protected]
0 likes, 0 repeats
The first thing Apple is doing is using all the advances they’ve made in buil…
Post #Aiok91n7kNmatdiGu0 by [email protected]
0 likes, 0 repeats
Then they’re throwing all kinds of processes at the server hardware to make s…
Post #Aiok933T36RyocMq12 by [email protected]
0 likes, 0 repeats
They also use a bunch of protections to ensure that software is legitimate. One…
Post #Aiok94EqeH9EUChROS by [email protected]
0 likes, 1 repeats
A second protection is that the operating system can “attest” to the softwa…
Post #Aiok95GIqLuDf0O7Ie by [email protected]
0 likes, 0 repeats
Of course, knowing that the phone is running a specific piece of software doesn…
Post #Aiol7uvTt0VTGjekWu by [email protected]
0 likes, 0 repeats
Security researchers will get *some code* and a VM they can use to run the soft…
Post #Aiol7uzNeVcrSpTrbk by [email protected]
0 likes, 1 repeats
When your phone wants to outsource a task, it will contact Apple and obtain a l…
Post #Aiol7v3HQ0kFevIyga by [email protected]
0 likes, 1 repeats
Ok there are probably half a dozen more technical details in the blog post. It�…
Post #Aiol7v6pCpa3puxoDA by [email protected]
0 likes, 0 repeats
But now the tough questions. Is it a good idea? And is it as secure as what App…
Post #Aiol7vAMzePs0ucdjk by [email protected]
0 likes, 0 repeats
Quick intermission: I also posted this thread on Twitter, and then this happene…
Post #Aiol7vEGl9XGD0Rkoa by [email protected]
0 likes, 0 repeats
Back to the substance.I admit that as I learned about this feature, it made me …
Post #Aiol7vHoXyN4O06aLA by [email protected]
0 likes, 1 repeats
As best I can tell, Apple does not have explicit plans to announce when your da…
Post #Aiol7vLiJTUSa5vhQ0 by [email protected]
0 likes, 0 repeats
Finally, there are so many invisible sharp edges that could exist in a system l…
Post #Aiol7vPG6IKGl5aWwa by [email protected]
0 likes, 1 repeats
Wrapping up on a more positive note: it’s worth keeping in mind that sometime…
Post #Aiol7vT9rnRexBPe1Q by [email protected]
0 likes, 1 repeats
And of course, keep in mind that super-spies aren’t your biggest adversary. F…
Post #Aiol7xAnX1wmEoq0gK by [email protected]
0 likes, 1 repeats
In any case, this is the world we’re moving to. Your phone might seem to be i…
Post #Aiomv1pJ7RtKoWkaq8 by [email protected]
0 likes, 1 repeats
@matthew_d_green oh my gods I’d have to take a shower if he replied to me
Post #AionZqkBEGfMJYojjs by [email protected]
0 likes, 1 repeats
@matthew_d_green I'm so sorry
Post #AionZshlwBvcOfhqGO by [email protected]
0 likes, 1 repeats
@matthew_d_green Is there information on the environmental impact of this featu…
Post #AiooMELQmjPtPYJKfQ by [email protected]
0 likes, 2 repeats
@matthew_d_green Suppose, only for the sake of argument, that these technical m…
Post #Aioop2DiwSSgCqROc4 by [email protected]
0 likes, 1 repeats
@matthew_d_green This is really good, and I hope to have time to really dig int…
Post #AiouEipa9Ys3N4DV3I by [email protected]
0 likes, 0 repeats
@slimhazard @matthew_d_green I think a more interesting question to ask about B…
Post #AiouEivxlpyVgrCazw by [email protected]
0 likes, 1 repeats
@abhayakara @matthew_d_green In Boeing‘s case, it‘s usually attributed to m…
Post #AiovgmQ8V6QoZBG1dw by [email protected]
0 likes, 1 repeats
@matthew_d_green related to Microsoft's "Why Should I Trust Your Code?…
Post #AiowZnkzEYrmdcFLCy by [email protected]
0 likes, 1 repeats
@matthew_d_green great write up, and I think this is a good world to be moving …
Post #Aip19tb5OesSzd59DE by [email protected]
0 likes, 1 repeats
@matthew_d_green it also assumes that you trust apple with your sensitive data.…
Post #Aip4yDc5YDdpPiEpyy by [email protected]
0 likes, 1 repeats
@matthew_d_green I wish instead we could focus on getting people to reject it a…
Post #AipJaohvTziOp0GgLY by [email protected]
0 likes, 0 repeats
@matthew_d_green It might be suboptimal, but it's the same as the code runn…
Post #AipJaonx7aXH7h5Ujw by [email protected]
0 likes, 0 repeats
@cesarb That’s true but the threat model is different. Assume Apple isn’t d…
Post #AipJaotcmV4ZPHk1a4 by [email protected]
0 likes, 1 repeats
@matthew_d_green @cesarb So, once again, it boils down to who you trust. Person…
Post #AipSa8TpNlotRXQKfY by [email protected]
0 likes, 2 repeats
@matthew_d_green Thank you for the thread. Do you think having this cloud magic…
Post #Aiq25frinqsCMJNFfU by [email protected]
0 likes, 1 repeats
@matthew_d_green that’s why I’ve blocked him
Post #Air90aGn4dkoOSZzrE by [email protected]
0 likes, 1 repeats
@matthew_d_green And of course the nation state who could defeat all the protec…
Post #AitS7z6bQ8hYtNyba4 by [email protected]
0 likes, 1 repeats
@matthew_d_green my concern is human nature and corporate greed. this is a dece…
Post #AixYNEzrzmwisbKDOC by [email protected]
0 likes, 1 repeats
@matthew_d_green Good thread about apple's "send your AI requests to t…
You are viewing proxied material from pleroma.anduin.net. The copyright of proxied material belongs to its original authors. Any comments or complaints in relation to proxied material should be directed to the original authors of the content concerned. Please see the disclaimer for more details.