This entire platform is the first time I've strategically considered realigning the majority of my use to Apple.<p>Airtag anonymity was pretty cool, technically speaking, but a peripheral use case for me.<p>To me, PCC is a well-reasoned, surprisingly customer-centric response to the fact that due to (processing, storage, battery) limitations not all useful models can be run on-device.<p>And they tried to build a privacy architecture <i>before</i> widely deploying it, instead of post-hoc bolting it on.<p>>> <i>4. Non-targetability. An attacker should not be able to attempt to compromise personal data that belongs to specific, targeted Private Cloud Compute users without attempting a broad compromise of the entire PCC system. This must hold true even for exceptionally sophisticated attackers who can attempt physical attacks on PCC nodes in the supply chain or attempt to obtain malicious access to PCC data centers.</i><p>Oof. That's a pretty damn specific (literally) attacker, and it's impressive that made it into their threat model.<p>And neat use of onion-style encryption to expose the bare minimum necessary for routing, before the request reaches its target node. Also [0]<p>>> <i>For example, the [PCC node OS] doesn’t even include a general-purpose logging mechanism. Instead, only pre-specified, structured, and audited logs and metrics can leave the node, and multiple independent layers of review help prevent user data from accidentally being exposed through these mechanisms.</i><p>My condolences to Apple SREs, between this and the other privacy guarantees.<p>>> <i>Our commitment to verifiable transparency includes: (1) Publishing the measurements of all code running on PCC in an append-only and cryptographically tamper-proof transparency log. (2) Making the log and associated binary software images publicly available for inspection and validation by privacy and security experts. (3) Publishing and maintaining an official set of tools for researchers analyzing PCC node software. (4) Rewarding important research findings through the Apple Security Bounty program.</i><p>So binary-only for majority, except the following:<p>>> <i>While we’re publishing the binary images of every production PCC build, to further aid research we will periodically also publish a subset of the security-critical PCC source code.</i><p>>> <i>In a first for any Apple platform, PCC images will include the sepOS firmware and the iBoot bootloader in plaintext, making it easier than ever for researchers to study these critical components.</i><p>[0] Oblivious HTTP, <a href="https://www.rfc-editor.org/rfc/rfc9458" rel="nofollow">https://www.rfc-editor.org/rfc/rfc9458</a>