Security News > 2022 > December > Google: How Android’s Private Compute Core protects your data
Google has disclosed more technical details about how Private Compute Core on Android works and keeps sensitive user data processed locally on protected devices.
The isolation of PCC from all other apps is achieved by using the Android Framework API for all data inputs and outputs from and to the PCC, facilitated by permissions granted during OS installation.
This data sealing includes Google itself, as all user data processing happens inside the PCC enclave, locally on the device.
If the ML features require the interaction of that data with outside endpoints, Google's Private Compute Services will enable an encrypted exchange.
Federated analytics and learning enable Google to train ML models without centralized data collection, running the raw data analysis computations locally on the users' devices.
If sensor toggles are turned to "Off," they will stop generating and sending data across the operating system, including the PCC. Additionally, users can restrict data sharing with PCC by going to Settings > Google > Personalize using app data and setting the toggle to the 'off' position for apps that support ML features.
News URL
Related news
- Google Warns of Actively Exploited CVE-2024-43093 Vulnerability in Android System (source)
- Google patches actively exploited Android vulnerability (CVE-2024-43093) (source)
- Google fixes two Android zero-days used in targeted attacks (source)
- Google's mysterious 'search.app' links leave Android users concerned (source)
- Week in review: Zero-click flaw in Synology NAS devices, Google fixes exploited Android vulnerability (source)
- Google launches on-device AI to alert Android users of scam calls in real-time (source)
- Google's New Restore Credentials Tool Simplifies App Login After Android Migration (source)
- SpyLoan Android malware on Google play installed 8 million times (source)
- 8 Million Android Users Hit by SpyLoan Malware in Loan Apps on Google Play (source)