Skip to Content

Apple Shares Private Cloud Compute Virtual Research Environment, Provides Bounties for Vulnerabilities

Private Cloud Compute is a cloud intelligence system that Apple designed for private artificial intelligence processing, and it's what Apple is using to keep Apple Intelligence requests secure when they need to be processed in the cloud.

Apple Intelligence General Feature 2
Apple promised to allow security and privacy researchers to verify the end-to-end security and privacy promises that Apple made with Private Cloud Compute, and today, Apple made its Private Cloud Compute Virtual Research Environment (VRE) and other materials publicly available to all security researchers.

Apple has a Private Cloud Compute (PCC) Security Guide that details all of the components of PCC and how they work to provide privacy for cloud-based AI processing. Apple released the source code for select components of PCC that help implement its security and privacy requirements, which allows for a deeper dive into PCC.

apple private cloud compute security
The Virtual Research Environment is a set of tools that lets researchers perform their own security analysis on PCC using a Mac. The VRE can be used for inspecting PCC software releases, verifying the consistency of the transparency log, booting a release in a virtualized environment, and modifying and debugging PCC software for deeper investigation. The VRE can be accessed in the macOS 18.1 Developer Preview and can be used with a Mac that has an Apple silicon chip and 16GB+ unified memory.

Along with these tools, Apple is expanding its Apple Security Bounty to include rewards for vulnerabilities that demonstrate a compromise of the fundamental privacy and security guarantees of Private Cloud Compute. Security researchers who locate a vulnerability can earn up to $1 million.

Popular Stories

MacBook Neo Feature Pastel 1

Apple Announces $599 'MacBook Neo' With A18 Pro Chip

Wednesday March 4, 2026 6:15 am PST by
Apple today announced the "MacBook Neo," an all-new kind of low-cost Mac featuring the A18 Pro chip for $599. The MacBook Neo is the first Mac to be powered by an iPhone chip; the A18 Pro debuted in 2024's iPhone 16 Pro models. Apple says it is up to 50% faster for everyday tasks than the bestselling PC with the latest shipping Intel Core Ultra 5, up to 3x faster for on-device AI workloads,...
MacBook Neo Feature Pastel 1

First MacBook Neo Benchmarks Are In: Here's How It Compares to the M1 MacBook Air

Thursday March 5, 2026 4:07 pm PST by
Benchmarks for the new MacBook Neo surfaced today, and unsurprisingly, CPU performance is almost identical to the iPhone 16 Pro. The MacBook Neo uses the same 6-core A18 Pro chip that was first introduced in the iPhone 16 Pro, but it has one fewer GPU core. The MacBook Neo earned a single-core score of 3461 and a multi-core score of 8668, along with a Metal score of 31286. Here's how the...
Multicolored Low Cost A18 Pro MacBook Feature

Apple Accidentally Leaks 'MacBook Neo'

Tuesday March 3, 2026 7:00 am PST by
Apple appears to have prematurely revealed the name of its rumored lower-cost MacBook model, which is expected to be announced this Wednesday. A regulatory document for a "MacBook Neo" (Model A3404) has appeared on Apple's website. Unfortunately, there are no further details or images available yet. While the PDF file does not contain the "MacBook Neo" name, it briefly appeared in a link...

Top Rated Comments

UpsideDownEclair Avatar
18 months ago

From a security perspective, the only way to 100% prove transparency is having an outside firm perform and publish an audit on their internal servers.

Which will never happen




Attachment Image
Score: 8 Votes (Like | Disagree)
ProbablyDylan Avatar
18 months ago

I'm talking about what Apple does with your data. There's nothing stopping them from having code we can't see that collects data from users.
Image pulled directly from Apple's documentation, and a link to where I found it ('https://security.apple.com/documentation/private-cloud-compute').

Score: 4 Votes (Like | Disagree)
ProbablyDylan Avatar
18 months ago

If you have proof that's true, let's see it. In comparison to Proton, they have had outsourced firms inspect their servers to verify they're statement of end-to-end encryption is true. Apple has done 0 outsourced audits of their servers.
Right. That's because none of this stuff is ready to go yet. Proton's products are ready to inspect. Apple's aren't. You don't check the doneness of a steak before it hits the grill do you?

You don't have to hear it from me though. You're welcome to read Apple's documentations and promises at that link I provided, but I get the feeling that you're more interested in being skeptical than in being informed.
Score: 3 Votes (Like | Disagree)
18 months ago

If you have proof that's true, let's see it. In comparison to Proton, they have had outsourced firms inspect their servers to verify they're statement of end-to-end encryption is true. Apple has done 0 outsourced audits of their servers.
This is quite better, anyone can verify the claims - virtual server Mseries with 16GB is needed: MacStudio will do. Run it yourself.

This is quite a bold step, now iCloud next please.
Score: 1 Votes (Like | Disagree)
Timpetus Avatar
18 months ago
Somehow I doubt there is a macOS 18.1 Developer Preview yet...
Score: 1 Votes (Like | Disagree)
macduke Avatar
18 months ago
I'm always curious how many of these bounties are actually collected? One time I sent an iPad OS Lock Screen bypass vulnerability to Apple and nobody ever responded. Feel like that should've been worth something. For how huge some of these vulnerabilities would impact their public image if they were released, you would think Apple would be interested in paying more for them.
Score: 1 Votes (Like | Disagree)