Apple says better keep data out of cloud

877

Apple’s recent Wonderlust event has garnered significant attention, particularly in the realm of digital viewership statistics. However, one noteworthy message from the tech giant has reverberated across the globe: safeguard your data by keeping it out of the cloud.

Apple, the American iPhone manufacturer that assembles its devices in the Indian subcontinent while branding them as US-developed due to their proprietary software exclusively designed by Cupertino engineers, delivered this advice.

While Apple didn’t delve into the specific reasons for this emphasis on data avoidance in the cloud, it did provide a comprehensive explanation of how its A17 Pro-System chip, powering the iPhone 15 Pro, maintains data locally, away from cloud-based storage.

The advantages of processing data at the edge, rather than in the cloud, are well-established. Edge processing minimizes latency issues associated with weak Wi-Fi or cellular networks and mitigates threats such as man-in-the-middle attacks, orchestrated by sophisticated criminals.

Apple’s iPhone 15 Pro and its Watch Series 9 implement this strategy by retaining sensitive information, like health data, directly on the device. This approach not only ensures swift data access but also eliminates many security concerns since a significant portion of the data never traverses cloud environments.

This achievement is made possible through the utilization of a Neural Engine equipped with 16 cores, employing machine learning and AI language processing to handle personal data without transmitting it to the cloud. Remarkably, the same number of cores also manages the M2 and M2 Max silicon wafers found in Mac devices.

In the United States, the iPhone 15 is priced between $800 and $1200, with the iPhone Pro Max version at the upper end of the spectrum. Interestingly, these prices translate to a relatively favorable exchange rate when considering the Dirham currency.

Ad
Naveen Goud is a writer at Cybersecurity Insiders covering topics such as Mergers & Acquisitions, Startups, Cyber Attacks, Cloud Security and Mobile Security

No posts to display