this post was submitted on 10 Jun 2024
49 points (79.5% liked)

Apple

17455 readers
118 users here now

Welcome

to the largest Apple community on Lemmy. This is the place where we talk about everything Apple, from iOS to the exciting upcoming Apple Vision Pro. Feel free to join the discussion!

Rules:
  1. No NSFW Content
  2. No Hate Speech or Personal Attacks
  3. No Ads / Spamming
    Self promotion is only allowed in the pinned monthly thread

Lemmy Code of Conduct

Communities of Interest:

Apple Hardware
Apple TV
Apple Watch
iPad
iPhone
Mac
Vintage Apple

Apple Software
iOS
iPadOS
macOS
tvOS
watchOS
Shortcuts
Xcode

Community banner courtesy of u/Antsomnia.

founded 1 year ago
MODERATORS
 

cross-posted from: https://lemmy.world/post/16391311

Andrej Karpathy endorses Apple Intelligence

Actually, really liked the Apple Intelligence announcement. It must be a very exciting time at Apple as they layer AI on top of the entire OS. A few of the major themes.

Step 1 Multimodal I/O. Enable text/audio/image/video capability, both read and write. These are the native human APIs, so to speak.

Step 2 Agentic. Allow all parts of the OS and apps to inter-operate via "function calling"; kernel process LLM that can schedule and coordinate work across them given user queries.

Step 3 Frictionless. Fully integrate these features in a highly frictionless, fast, "always on", and contextual way. No going around copy pasting information, prompt engineering, or etc. Adapt the UI accordingly.

Step 4 Initiative. Don't perform a task given a prompt, anticipate the prompt, suggest, initiate.

Step 5 Delegation hierarchy. Move as much intelligence as you can on device (Apple Silicon very helpful and well-suited), but allow optional dispatch of work to cloud.

Step 6 Modularity. Allow the OS to access and support an entire and growing ecosystem of LLMs (e.g. ChatGPT announcement).

Step 7 Privacy. <3

We're quickly heading into a world where you can open up your phone and just say stuff. It talks back and it knows you. And it just works. Super exciting and as a user, quite looking forward to it.

https://x.com/karpathy/status/1800242310116262150?s=46

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 1 points 5 months ago* (last edited 5 months ago) (2 children)

Did you even watch wwdc. Apple showed how its servers and data from device to the cloud were going to work. The entire thing is open to third party scrutiny and moreover, their servers won’t run on anything that isn’t. They are as transparent as basically Mullvad with ensuring you don’t come across a scenario like “trust me it’s secure bro.” Craig even joked that most businesses that rolled out AI privacy are doing just that.

Or would you rather just be an edgelord.

[–] [email protected] 4 points 5 months ago (1 children)

comparing with mullvad is ridiculous and just shows how much you drank the apple juice without questioning

  • mullvad doesn't hold your contact info, like apple right?
  • mullvad is open source so you can independently verified which data is being sent, just like apple right?
  • mullvad claims to not log anything, like apple and their csam thing on icloud right?

"leave alone the multi billion dollar corporation" energy

[–] [email protected] 0 points 5 months ago* (last edited 5 months ago) (1 children)

Wow another idiot who did zero research into Apple’s implementation and just uses the “they are a billion dollar company” slam.

Not saying it’s better than Mullvad but it’s not nearly as poor as other VPNs. Also no, Apple doesn’t send your contact info or other details into the cloud, all that shit is anonymized.

I mean at least do SOME research into the service you’re slamming and saying is just as insecure as CoPilot+ ffs.

Yes. Lemmy needs hate Apple. We get it.

[–] [email protected] 2 points 4 months ago (1 children)

Apple doesn’t send your contact info or other details into the cloud, all that shit is anonymized.

Are you sure about that ? It is written in their Legal Privacy Policy in the chapter "Personal Data Apple Collects from You":

Contact Information. Data such as name, email address, physical address, phone number, or other contact information

Doesn't seems so anonymized to me...

[–] [email protected] 1 points 4 months ago

Go watch their WWDC 2024 keynote on how their cloud computing is set up to handle privacy and the sharing of information from device to cloud. And how they setup their proprietary servers.

As for generally collecting details (like contact info, location info, payment details, and even government issues IDs) how do you propose they offer services like Apple Card, Apple Pay, Digital Driver's Licenses, etc. without knowing that info???

I swear half of Lemmy doomsday preppers! We are talking about secure transmission from device to cloud while respecting your privacy; not using Apple services as a ghost. They are not aiming to replace Mullvad; they want to build AI on top of a secure platform that doesn't shine a flood light on your private life.

Scour their UELA all you want, really has nothing to do with the conversation; we all know they have info on you as we all know smoking causes cancer.

[–] [email protected] 2 points 5 months ago (3 children)

No source-code, no trust. How good is my data on their super secure servers if they have the encryption keys.

How good is a 3rd party scrutiny if those are mandated and paid by Apple to make the audits?

[–] [email protected] 1 points 5 months ago* (last edited 5 months ago) (1 children)

You almost certainly run all of your software on code you lack access to the source for. Firmware and etc has been completely proprietary for ages. There's even a tiny proprietary os embedded in almost every processor on the planet. Your statement lacks context of computing and shows a misplacement of trust.

https://www.zdnet.com/article/minix-intels-hidden-in-chip-operating-system/

https://en.m.wikipedia.org/wiki/AMD_Platform_Security_Processor

[–] [email protected] -1 points 5 months ago (1 children)

Intel and AMD security platforms are shit, I know they exist, I don't trust them either, but the threat model is very different from this AI application. They don't upload my photos to a server out of my control.

[–] [email protected] 1 points 4 months ago* (last edited 4 months ago) (1 children)

They're not just security platforms. They're low level computer systems with entire bespoke operating systems and better-than-kernel level access to the system (networking, etc). You have no idea what you're talking about. Please inform yourself.

[–] [email protected] 1 points 4 months ago (1 children)

I may not be very well informed about it, I admit. Would you have documents to share ? All I seem to find about Intel security engine is about how closed it is and how it has been exploited by bad actors in the past to gain elevated privileges in targeted hacks. It sucks, that's for sure. But it doesn't have much to do with the mass data collection employed by Google, Apple, Open AI, etc.

[–] [email protected] 1 points 4 months ago

I unfortunately don't have much to share beyond a decent understanding of compute systems at an enterprise scale (where we utilize these low level subprocessors to do various things such as gather asset data or deploy operating system configurations, see: https://en.m.wikipedia.org/wiki/Intel_Active_Management_Technology). The point I'm trying to make though is that current operating models don't allow for system trust. If you can't trust apple with high level data like that needed for llm models on-device (which is how they've configured it, requiring a specific user approval and interaction before forwarding minimal data to private process servers) then you shouldn't trust any device that lacks a complete open boot/firmware/ and OS stack because if these companies were going to exploit your data that egregiously, they already have the lowest level (best) access possible to a system that can transparently (without your knowledge) access encryption enclaves, networking, and storage. Truly open alternatives do exist by the way (see Coreboot, etc) but you're going to be looking at devices 10-20 years old since almost the entire industry runs proprietary at that level and it takes time for the less heavily funded community players to get up to speed.

[–] [email protected] 4 points 5 months ago (1 children)

They said people will be able to independently verify their claims.

[–] [email protected] 0 points 5 months ago

You can't independently verify without source code. Will it be published?

[–] [email protected] 1 points 5 months ago

Again you’re just talking out your ass. Anyway.