Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Review Week: X CEO Linda Yaccarino stepping on

New Rowhammer Attack Variant Degrades AI Models on Nvidia GPUs

Xai and Grok apologise for “terrifying behaviour”

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » WhatsApp launches private processes to enable AI features while protecting message privacy
Identity

WhatsApp launches private processes to enable AI features while protecting message privacy

userBy userApril 29, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 29, 2025Ravi LakshmananArtificial Intelligence/Data Protection

WhatsApp starts private processing

Popular messaging app WhatsApp announced on Tuesday a new technology called Private Processing to enable Artificial Intelligence (AI) features in a way that provides privacy.

“Private processing allows users to take advantage of powerful optional AI capabilities while maintaining WhatsApp’s core privacy promises, such as unread message summary and editing help,” Meta Owner Services said in a statement shared with Hacker News.

With the introduction of modern features, the idea is to promote the use of AI features while keeping users’ messages private. It will be available in the coming weeks.

This feature allows users to initiate requests to use AI to process messages in a secure environment called Confidential Virtual Machine (CVM) so that other parties, including Meta and WhatsApp, cannot access them.

Cybersecurity

Confidential processing is one of three doctrines that underpin functions, and the others are –

Enforceable assurances that allow the system to fail or publicly discover when an attempt to modify a confidentiality guarantee detects verifiable transparency allows users and independent researchers to audit the system’s non-target behavior.

The system is designed as follows: Private processing will obtain anonymous credentials to ensure that future requests come from legal WhatsApp clients and establish an unforgettable HTTP (OHTTP) connection between the user’s device and the meta gateway via a third-party relay that hides the source IP address from the meta and WhatsApp.

A secure application session is then established between the user’s device and the trusted execution environment (TEE), followed by an encrypted request to the private processing system using a ephemeral key.

This also means that requests cannot be sent from a T-shirt or request (such as a summary of a message) by someone other than the user’s device.

Data is processed in CVM and the results are sent to the user’s device in encrypted form using keys that are only accessible on devices and private processing servers.

Meta also acknowledged weak links within systems that could be exposed to potential attacks via compromised insiders, supply chain risks, and malicious end users, but emphasized that it adopted a detailed approach to minimizing the attack surface.

Cybersecurity

Additionally, the company has pledged to publish third-party logs of CVM binary digests and CVM binary images to help external researchers “analyze, replicate and report instances where the logs may leak user data.”

This development comes when Meta releases a dedicated meta AI app built in Llama 4 that comes with a “social” discovery feed to share and investigate and even remix prompts.

Private processing in a way reflects Apple’s approach to confidential AI processing, known as Private Cloud Compute (PCC). This routes PCC requests through an OHTTP relay and processes them in a sandboxed environment.

Late last year, iPhone manufacturers released the PCC Virtual Research Environment (VRE) to allow the research community to inspect and verify the privacy and security guarantees of their systems.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleIsrael releases Gaza paramedics who survived a fatal attack on healthcare workers | Gaza News
Next Article At least 22 people have died in restaurant fires in northeastern China | News
user
  • Website

Related Posts

New Rowhammer Attack Variant Degrades AI Models on Nvidia GPUs

July 12, 2025

Over 600 laravel apps exposed to remote code execution due to app_keys leaked on github

July 12, 2025

Fortinet releases patches for important SQL injection defects in Fortiweb (CVE-2025-25257)

July 11, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Review Week: X CEO Linda Yaccarino stepping on

New Rowhammer Attack Variant Degrades AI Models on Nvidia GPUs

Xai and Grok apologise for “terrifying behaviour”

Over 600 laravel apps exposed to remote code execution due to app_keys leaked on github

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

The Future of Process Automation is Here: Meet TwinH

Robots Play Football in Beijing: A Glimpse into China’s Ambitious AI Future

TwinH: A New Frontier in the Pursuit of Immortality?

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.