Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » WhatsApp launches private processing to enable AI features by protecting the privacy of messages
Global Security

WhatsApp launches private processing to enable AI features by protecting the privacy of messages

AdminBy AdminApril 29, 2025No Comments3 Mins Read
WhatsApp Launches Private Processing
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


April 29, 2025Red LakshmananArtificial Intelligence / Data Protection

WhatsApp launches private processing

A popular WhatsApp messaging app on Tuesday has introduced a new technology called private processing to provide artificial intelligence (AI) in privacy.

“Private processing will allow users to use the powerful additional features of AI-CONSSPERATION, summarize unread messages or editing-editing-mainstream Promises of WhatsApp’s privacy,”-said general With hacker news.

With the introduction of the latest function, the idea is to facilitate the use of AI features, keeping users’ messages in particular. It is expected to be available in the coming weeks.

The opportunity, in a nutshell, allows users to initiate a request for messages using AI in a safe setting called a confidential virtual machine (CVM), so no other side, including Meta and WhatsApp, can access them.

Cybersecurity

Confidential treatment – one of the three principles underlying function, the rest – this –

  • Provided guarantees that force the system to refuse or become publicly expressed if attempts to change confidential guarantees will be identified
  • Check transparency that allows users and independent researchers to check the system behavior
  • Obsceneity that prevents a particular user to target without breaking all security architecture
  • Treatment of statelessness and forward security that ensures that messages are not stored after processing messages so the attacker could not restore historical requests and answers

The system is designed as follows: Private processing gets anonymous credentials to make sure that future requests come from a legal WhatsApp client and then continues to install inattentive http (Ohttp) Connecting between the user’s device and meta-gate using the third relay, which also hides the source IP address from Meta and WhatsApp.

The following is an installed session of a safe application between the user’s device and the conditional execution environment (TeE), after which an encrypted request in the private processing system with an ephemeral key.

It also means that the request cannot be deciphered by anyone, except for a Tee or a user’s device (such as summarizing).

The data is processed in CVM, and the results are sent back to the user’s device in an encrypted format, using the key available only on the device and the private processing server.

Meta also recognized weak connections in the system that could submit it potential attacks with impaired insiders, the risks of supply chain and malicious end users, but emphasized that it took a striking approach to minimize the attack surface.

Cybersecurity

In addition, the company promised to publish the third CVM binary digestion magazines and CVM binary images to help external researchers “analyze, repeat and report cases where they believe that magazines can trace users’ data.”

Development occurs as meta liberated The dedicated Meta AI app built with Llama 4, which comes with the “social” channel to share and explore the clues and even remix them.

In some ways private processing displays Apple’s approach to confidential processing AI called Private Cloud Compute (PCC), which also directs PCC requests through the Ohttp relay and processes them on Wednesday with sandy.

At the end of last year’s iPhone manufacturer Publicly made available Its virtual research environment PCC (VRE) will allow the research community to check and check the privacy and security guarantees.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025

New data Wiper Pathwiper Data Wiper violates Ukrainian critical infrastructure in 2025 attack

June 6, 2025

Popular Chrome Extensions API leaks, user data via HTTP and Hard Codes

June 5, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.