Apple Shares Private Cloud Compute Virtual Research Environment, Provides Bounties for Vulnerabilities

Private Cloud Compute is a cloud intelligence system that Apple designed for private artificial intelligence processing, and it's what Apple is using to keep Apple Intelligence requests secure when they need to be processed in the cloud.

Apple Intelligence General Feature 2
Apple promised to allow security and privacy researchers to verify the end-to-end security and privacy promises that Apple made with Private Cloud Compute, and today, Apple made its Private Cloud Compute Virtual Research Environment (VRE) and other materials publicly available to all security researchers.

Apple has a Private Cloud Compute (PCC) Security Guide that details all of the components of PCC and how they work to provide privacy for cloud-based AI processing. Apple released the source code for select components of PCC that help implement its security and privacy requirements, which allows for a deeper dive into PCC.

apple private cloud compute security
The Virtual Research Environment is a set of tools that lets researchers perform their own security analysis on PCC using a Mac. The VRE can be used for inspecting PCC software releases, verifying the consistency of the transparency log, booting a release in a virtualized environment, and modifying and debugging PCC software for deeper investigation. The VRE can be accessed in the macOS 18.1 Developer Preview and can be used with a Mac that has an Apple silicon chip and 16GB+ unified memory.

Along with these tools, Apple is expanding its Apple Security Bounty to include rewards for vulnerabilities that demonstrate a compromise of the fundamental privacy and security guarantees of Private Cloud Compute. Security researchers who locate a vulnerability can earn up to $1 million.

Popular Stories

iOS 26

iOS 26.4 and iOS 27 Features Revealed in New Leak

Friday December 12, 2025 10:56 am PST by
Macworld's Filipe Espósito today revealed a handful of features that Apple is allegedly planning for iOS 26.4, iOS 27, and even iOS 28. The report said the features are referenced within the code for a leaked internal build of iOS 26 that is not meant to be seen by the public. However, it appears that Espósito and/or his sources managed to gain access to it, providing us with a sneak peek...
apple beta 26 lineup

Apple Leak Confirms Work on Foldable iPhone, AirTag 2, and Dozens More Devices

Monday December 15, 2025 2:05 pm PST by
Last week, details about unreleased Apple devices and future iOS features were shared by Macworld. This week, we learned where the information came from, plus we have more findings from the leak. As it turns out, an Apple prototype device running an early build of iOS 26 was sold, and the person who bought it shared the software. The OS has a version number of 23A5234w, and the first...
Apple Logo Top Half

Early iOS 26 Software Leak Uncovers Dozens of Upcoming Apple Features

Monday December 15, 2025 3:05 pm PST by
Software from an iPhone prototype running an early build of iOS 26 leaked last week, giving us a glimpse at future Apple devices and iOS features. We recapped device codenames in our prior article, and now we have a list of some of the most notable feature flags that were found in the software code. In some cases, it's obvious what the feature flags are referring to, while some are more...
Apple Foldable Thumb

Leak Reveals Foldable iPhone Details

Monday December 15, 2025 9:09 am PST by
The first foldable iPhone will feature a series of design and hardware firsts for Apple, according to details shared by the Weibo leaker known as Digital Chat Station. According to a new post, via machine translation, Apple is developing what the leaker describes as a "wide foldable" device, a term used to refer to a horizontally oriented, book-style foldable with a large internal display....
iOS 26

iOS 26.3 Beta 1 Features: What's New So Far

Monday December 15, 2025 4:23 pm PST by
Apple is testing iOS 26.3, the next version of iOS 26 that will launch around January. Since iOS 26.3's testing is happening over the holidays, it is a smaller update with fewer features than we've seen in prior betas. We've rounded up what's new so far, and we'll add to our list with subsequent betas if we come across any other features. Transfer to Android Apple is making it simpler...
iOS 26

Apple Releases iOS 26.2 With Alarms for Reminders, Lock Screen Changes, Enhanced Safety Alerts and More

Friday December 12, 2025 10:10 am PST by
Apple today released iOS 26.2, the second major update to the iOS 26 operating system that came out in September, iOS 26.2 comes a little over a month after iOS 26.1 launched. ‌iOS 26‌.2 is compatible with the ‌iPhone‌ 11 series and later, as well as the second-generation ‌iPhone‌ SE. The new software can be downloaded on eligible iPhones over-the-air by going to Settings >...
iOS 26

iOS 26.2 Coming Soon With These 8 New Features on Your iPhone

Thursday December 11, 2025 8:49 am PST by
Apple seeded the second iOS 26.2 Release Candidate to developers earlier this week, meaning the update will be released to the general public very soon. Apple confirmed iOS 26.2 would be released in December, but it did not provide a specific date. We expect the update to be released by early next week. iOS 26.2 includes a handful of new features and changes on the iPhone, such as a new...
airpods max 2024 colors

AirPods Max 2 Likely to Offer These 10 New Features

Monday December 15, 2025 7:41 am PST by
Apple released the AirPods Max on December 15, 2020, meaning the over-ear headphones launched five years ago today. While the AirPods Max were updated with a USB-C port and new color options last year, followed by support for lossless audio and ultra-low latency audio this year, the headphones lack some of the features that have been introduced for newer generations of the regular AirPods and the ...

Top Rated Comments

UpsideDownEclair Avatar
15 months ago

From a security perspective, the only way to 100% prove transparency is having an outside firm perform and publish an audit on their internal servers.

Which will never happen




Attachment Image
Score: 8 Votes (Like | Disagree)
ProbablyDylan Avatar
15 months ago

I'm talking about what Apple does with your data. There's nothing stopping them from having code we can't see that collects data from users.
Image pulled directly from Apple's documentation, and a link to where I found it ('https://security.apple.com/documentation/private-cloud-compute').

Score: 4 Votes (Like | Disagree)
ProbablyDylan Avatar
15 months ago

If you have proof that's true, let's see it. In comparison to Proton, they have had outsourced firms inspect their servers to verify they're statement of end-to-end encryption is true. Apple has done 0 outsourced audits of their servers.
Right. That's because none of this stuff is ready to go yet. Proton's products are ready to inspect. Apple's aren't. You don't check the doneness of a steak before it hits the grill do you?

You don't have to hear it from me though. You're welcome to read Apple's documentations and promises at that link I provided, but I get the feeling that you're more interested in being skeptical than in being informed.
Score: 3 Votes (Like | Disagree)
bergert Avatar
15 months ago

If you have proof that's true, let's see it. In comparison to Proton, they have had outsourced firms inspect their servers to verify they're statement of end-to-end encryption is true. Apple has done 0 outsourced audits of their servers.
This is quite better, anyone can verify the claims - virtual server Mseries with 16GB is needed: MacStudio will do. Run it yourself.

This is quite a bold step, now iCloud next please.
Score: 1 Votes (Like | Disagree)
Timpetus Avatar
15 months ago
Somehow I doubt there is a macOS 18.1 Developer Preview yet...
Score: 1 Votes (Like | Disagree)
macduke Avatar
15 months ago
I'm always curious how many of these bounties are actually collected? One time I sent an iPad OS Lock Screen bypass vulnerability to Apple and nobody ever responded. Feel like that should've been worth something. For how huge some of these vulnerabilities would impact their public image if they were released, you would think Apple would be interested in paying more for them.
Score: 1 Votes (Like | Disagree)