Security News > 2022 > December > Google: How Android’s Private Compute Core protects your data

Google has disclosed more technical details about how Private Compute Core on Android works and keeps sensitive user data processed locally on protected devices.
The isolation of PCC from all other apps is achieved by using the Android Framework API for all data inputs and outputs from and to the PCC, facilitated by permissions granted during OS installation.
This data sealing includes Google itself, as all user data processing happens inside the PCC enclave, locally on the device.
If the ML features require the interaction of that data with outside endpoints, Google's Private Compute Services will enable an encrypted exchange.
Federated analytics and learning enable Google to train ML models without centralized data collection, running the raw data analysis computations locally on the users' devices.
If sensor toggles are turned to "Off," they will stop generating and sending data across the operating system, including the PCC. Additionally, users can restrict data sharing with PCC by going to Settings > Google > Personalize using app data and setting the toggle to the 'off' position for apps that support ML features.
News URL
Related news
- Google blocked 2.36 million risky Android apps from Play Store in 2024 (source)
- Google Bans 158,000 Malicious Android App Developer Accounts in 2024 (source)
- Google fixes Android kernel zero-day exploited in attacks (source)
- Google Patches 47 Android Security Flaws, Including Actively Exploited CVE-2024-53104 (source)
- Google patches odd Android kernel security bug amid signs of targeted exploitation (source)
- Crypto-stealing iOS, Android malware found on App Store, Google Play (source)
- Google Confirms Android SafetyCore Enables AI-Powered On-Device Content Classification (source)
- SpyLend Android malware downloaded 100,000 times from Google Play (source)