Apple opens up Private Cloud Compute to security researchers, offers bug bounties up to $1 million

Apple Intelligence on an iPad.
(Image credit: Shutterstock)

Apple has confirmed it will open up its Private Cloud Compute (PCC) system – a secure cloud platform built to support the iPhone maker’s Apple Intelligence features – to security researchers who think they can spot vulnerabilities in its code.

Through the release of a Virtual Research Environment (VRE) and select PCC source code, the security community can inspect and validate the company’s security and privacy features.

To incentivize the reporting of vulnerabilities and bugs, Apple will offer up to $1 million as a reward for the most serious instance.

Apple bug bounties

PCC is engineered to ensure sensitive data from Apple devices is processed without compromising user privacy by preventing any unauthorized third party from accessing it, including Apple itself. Initially, only select auditors and researchers had access to review the code, but now Apple is expanding access to public researchers.

Running on macOS Sequoia 15.1 Developer Preview, the VRE allows users to boot PCC releases, examine the software and modify or debug it. The virtual environment is meant to mirror the secure cloud accurately, helping researchers to investigate its architecture without interfering with the live product.

Arbitrary code execution with arbitrary entitlements are the most lucrative discoveries, worth a $1 million bounty from the company. Other rewards, set at $250,000, $150,000, $100,000 and $50,000 are also available.

Apple also committed to considering reports that don’t match the predetermined categories, saying it would, “evaluate every report according to the quality of what's presented, the proof of what can be exploited, and the impact to users.”

“We believe Private Cloud Compute is the most advanced security architecture ever deployed for cloud AI compute at scale, and we look forward to working with the research community to build trust in the system and make it even more secure and private over time," the company added.

More from TechRadar Pro

Craig Hale

With several years’ experience freelancing in tech and automotive circles, Craig’s specific interests lie in technology that is designed to better our lives, including AI and ML, productivity aids, and smart fitness. He is also passionate about cars and the decarbonisation of personal transportation. As an avid bargain-hunter, you can be sure that any deal Craig finds is top value!

Read more
A woman at a table using a Windows laptop, opposite sits a man, neither show their face
Microsoft will now pay you even more to find security bugs in Copilot
Application Security Testing Concept with Digital Magnifying Glass Scanning Applications to Detect Vulnerabilities - AST - Process of Making Apps Resistant to Security Threats - 3D Illustration
Google bug bounty payments hit nearly $12 million in 2024
An abstract image of a lock against a digital background, denoting cybersecurity.
Apple CPU security issue could let hackers steal user data from browsers
Security
Microsoft reveals more on a potentially major Apple macOS security flaw
A hand holding an iPhone with the iCloud logo on screen.
UK's Apple iCloud backdoor "jeopardizes the security and privacy of millions," warn experts
A person at a laptop with a cybersecure lock symbol floating above it.
Parallels Desktop has some worrying security flaws for Mac users
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
Ray-Ban Meta Smart Glasses
Samsung's rumored smart specs may be launching before the end of 2025
Apple iPhone 16 Review
The latest iPhone 18 leak hints at a major chipset upgrade for all four models
Quordle on a smartphone held in a hand
Quordle hints and answers for Monday, March 24 (game #1155)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Monday, March 24 (game #386)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Monday, March 24 (game #652)
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)