Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

You should read the PCC paper: https://security.apple.com/blog/private-cloud-compute/

You are not in fact trusting Apple at all. You are trusting some limited number of independent security researchers, which is not perfect, but the system is very carefully designed to give Apple themselves no avenue to exploit without detection.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: