top | item 40680939

(no title)

sradman | 1 year ago

There is also a technical blog post [1] on the architecture of Private Cloud Compute. I don't think that there are any details on the context being sent, just that any context is ephemeral, can't be traced back to you, and that the machine instances leverage Apple Silicon's Secure Boot and Secure Enclave.

[1] https://security.apple.com/blog/private-cloud-compute/

discuss

order

ethbr1|1 year ago

Which, IMHO, is the right way to do it.

Overly freezing the context guarantees at this early stage would be highly limiting.

It makes more sense to invest in surrounding privacy infrastructure (PCC) to provide sane guarantees without strictly bounding context.