Security News > 2022 > December > Google: How Android’s Private Compute Core protects your data
Google has disclosed more technical details about how Private Compute Core on Android works and keeps sensitive user data processed locally on protected devices.
The isolation of PCC from all other apps is achieved by using the Android Framework API for all data inputs and outputs from and to the PCC, facilitated by permissions granted during OS installation.
This data sealing includes Google itself, as all user data processing happens inside the PCC enclave, locally on the device.
If the ML features require the interaction of that data with outside endpoints, Google's Private Compute Services will enable an encrypted exchange.
Federated analytics and learning enable Google to train ML models without centralized data collection, running the raw data analysis computations locally on the users' devices.
If sensor toggles are turned to "Off," they will stop generating and sending data across the operating system, including the PCC. Additionally, users can restrict data sharing with PCC by going to Settings > Google > Personalize using app data and setting the toggle to the 'off' position for apps that support ML features.
News URL
Related news
- Google: Gemini AI for Android processes sensitive data locally (source)
- Google says it's focusing on privacy with Gemini AI on Android (source)
- Google Removing Poor-Quality Android Apps From Play Store to Boost Engagement (source)
- Google backports fix for Pixel EoP flaw to other Android devices (source)
- Android malware 'Necro' infects 11 million devices via Google Play (source)
- New Octo Android malware version impersonates NordVPN, Google Chrome (source)
- Google's Shift to Rust Programming Cuts Android Memory Vulnerabilities by 68% (source)
- Google sees 68% drop in Android memory safety flaws over 5 years (source)
- Fake WalletConnect app on Google Play steals Android users’ crypto (source)