Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Chinese hackers operate Ivanti CSA Zero-Days in attacks on the French government, telecommunications

July 3, 2025

More than 40 malicious Firefox extensions target cryptocurrency wallets, steel assets

July 3, 2025

CISCO’s critical vulnerability in uniform grants on root access to static credentials

July 3, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » WhatsApp launches private processing to enable AI features by protecting the privacy of messages
Global Security

WhatsApp launches private processing to enable AI features by protecting the privacy of messages

AdminBy AdminApril 29, 2025No Comments3 Mins Read
WhatsApp Launches Private Processing
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


April 29, 2025Red LakshmananArtificial Intelligence / Data Protection

WhatsApp launches private processing

A popular WhatsApp messaging app on Tuesday has introduced a new technology called private processing to provide artificial intelligence (AI) in privacy.

“Private processing will allow users to use the powerful additional features of AI-CONSSPERATION, summarize unread messages or editing-editing-mainstream Promises of WhatsApp’s privacy,”-said general With hacker news.

With the introduction of the latest function, the idea is to facilitate the use of AI features, keeping users’ messages in particular. It is expected to be available in the coming weeks.

The opportunity, in a nutshell, allows users to initiate a request for messages using AI in a safe setting called a confidential virtual machine (CVM), so no other side, including Meta and WhatsApp, can access them.

Cybersecurity

Confidential treatment – one of the three principles underlying function, the rest – this –

  • Provided guarantees that force the system to refuse or become publicly expressed if attempts to change confidential guarantees will be identified
  • Check transparency that allows users and independent researchers to check the system behavior
  • Obsceneity that prevents a particular user to target without breaking all security architecture
  • Treatment of statelessness and forward security that ensures that messages are not stored after processing messages so the attacker could not restore historical requests and answers

The system is designed as follows: Private processing gets anonymous credentials to make sure that future requests come from a legal WhatsApp client and then continues to install inattentive http (Ohttp) Connecting between the user’s device and meta-gate using the third relay, which also hides the source IP address from Meta and WhatsApp.

The following is an installed session of a safe application between the user’s device and the conditional execution environment (TeE), after which an encrypted request in the private processing system with an ephemeral key.

It also means that the request cannot be deciphered by anyone, except for a Tee or a user’s device (such as summarizing).

The data is processed in CVM, and the results are sent back to the user’s device in an encrypted format, using the key available only on the device and the private processing server.

Meta also recognized weak connections in the system that could submit it potential attacks with impaired insiders, the risks of supply chain and malicious end users, but emphasized that it took a striking approach to minimize the attack surface.

Cybersecurity

In addition, the company promised to publish the third CVM binary digestion magazines and CVM binary images to help external researchers “analyze, repeat and report cases where they believe that magazines can trace users’ data.”

Development occurs as meta liberated The dedicated Meta AI app built with Llama 4, which comes with the “social” channel to share and explore the clues and even remix them.

In some ways private processing displays Apple’s approach to confidential processing AI called Private Cloud Compute (PCC), which also directs PCC requests through the Ohttp relay and processes them on Wednesday with sandy.

At the end of last year’s iPhone manufacturer Publicly made available Its virtual research environment PCC (VRE) will allow the research community to check and check the privacy and security guarantees.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Chinese hackers operate Ivanti CSA Zero-Days in attacks on the French government, telecommunications

July 3, 2025

More than 40 malicious Firefox extensions target cryptocurrency wallets, steel assets

July 3, 2025

CISCO’s critical vulnerability in uniform grants on root access to static credentials

July 3, 2025

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025

Hackers using PDFs to get yourself for Microsoft, Docusign and more in phishing campaigns return call

July 2, 2025

This network traffic looks legal but it can hide a serious threat

July 2, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Chinese hackers operate Ivanti CSA Zero-Days in attacks on the French government, telecommunications

July 3, 2025

More than 40 malicious Firefox extensions target cryptocurrency wallets, steel assets

July 3, 2025

CISCO’s critical vulnerability in uniform grants on root access to static credentials

July 3, 2025

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025

Hackers using PDFs to get yourself for Microsoft, Docusign and more in phishing campaigns return call

July 2, 2025

This network traffic looks legal but it can hide a serious threat

July 2, 2025

US Sanctions of Russia

July 2, 2025

V0 AI Vercel tool, armed with cybercrime for quick creation pages to enter scale

July 2, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Chinese hackers operate Ivanti CSA Zero-Days in attacks on the French government, telecommunications

July 3, 2025

More than 40 malicious Firefox extensions target cryptocurrency wallets, steel assets

July 3, 2025

CISCO’s critical vulnerability in uniform grants on root access to static credentials

July 3, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.