{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2017:LBYDEKH2EWJ5STNJ3UNCV56EXQ","short_pith_number":"pith:LBYDEKH2","canonical_record":{"source":{"id":"1709.02753","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2017-09-08T16:00:14Z","cross_cats_sorted":["cs.CY","cs.LG"],"title_canon_sha256":"7c773ea4f403ccc389245f814e8356ff31d144fc4929758905f4000d7aade20a","abstract_canon_sha256":"f057a88ede1d813829bac88d47a6efa879101fde9fcacb5c3394ae5fc072f741"},"schema_version":"1.0"},"canonical_sha256":"58703228fa2593d94da9dd1a2af7c4bc11b9ea0be580d9de33614b836d96b2ca","source":{"kind":"arxiv","id":"1709.02753","version":2},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1709.02753","created_at":"2026-05-18T00:35:40Z"},{"alias_kind":"arxiv_version","alias_value":"1709.02753v2","created_at":"2026-05-18T00:35:40Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1709.02753","created_at":"2026-05-18T00:35:40Z"},{"alias_kind":"pith_short_12","alias_value":"LBYDEKH2EWJ5","created_at":"2026-05-18T12:31:28Z"},{"alias_kind":"pith_short_16","alias_value":"LBYDEKH2EWJ5STNJ","created_at":"2026-05-18T12:31:28Z"},{"alias_kind":"pith_short_8","alias_value":"LBYDEKH2","created_at":"2026-05-18T12:31:28Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2017:LBYDEKH2EWJ5STNJ3UNCV56EXQ","target":"record","payload":{"canonical_record":{"source":{"id":"1709.02753","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2017-09-08T16:00:14Z","cross_cats_sorted":["cs.CY","cs.LG"],"title_canon_sha256":"7c773ea4f403ccc389245f814e8356ff31d144fc4929758905f4000d7aade20a","abstract_canon_sha256":"f057a88ede1d813829bac88d47a6efa879101fde9fcacb5c3394ae5fc072f741"},"schema_version":"1.0"},"canonical_sha256":"58703228fa2593d94da9dd1a2af7c4bc11b9ea0be580d9de33614b836d96b2ca","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:35:40.478038Z","signature_b64":"RbSyEeNpzcX0gHLgUOaaRePCaflLTFkp0EoeRDGtx9a/Zf7p3dh/7H6SiG1v7b3GL8dZA7e2Koy+bg7KNygFAA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"58703228fa2593d94da9dd1a2af7c4bc11b9ea0be580d9de33614b836d96b2ca","last_reissued_at":"2026-05-18T00:35:40.477351Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:35:40.477351Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1709.02753","source_version":2,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:35:40Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"7w6UuDttP1kV5f6gx/i9yrEh7P5nm699IAillFJx1vwzDOR84jYE5x5J78EiLvcOMvoVaPw0uqVux2YWKRVRCA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T00:23:39.004040Z"},"content_sha256":"7a160c7d3f60bb98406f09b4976033fb7755f63e4ed89fe2a6155c3a067956db","schema_version":"1.0","event_id":"sha256:7a160c7d3f60bb98406f09b4976033fb7755f63e4ed89fe2a6155c3a067956db"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2017:LBYDEKH2EWJ5STNJ3UNCV56EXQ","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Privacy Loss in Apple's Implementation of Differential Privacy on MacOS 10.12","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CY","cs.LG"],"primary_cat":"cs.CR","authors_text":"Aleksandra Korolova, Jun Tang, Xiaofeng Wang, Xiaolong Bai, Xueqiang Wang","submitted_at":"2017-09-08T16:00:14Z","abstract_excerpt":"In June 2016, Apple announced that it will deploy differential privacy for some user data collection in order to ensure privacy of user data, even from Apple. The details of Apple's approach remained sparse. Although several patents have since appeared hinting at the algorithms that may be used to achieve differential privacy, they did not include a precise explanation of the approach taken to privacy parameter choice. Such choice and the overall approach to privacy budget use and management are key questions for understanding the privacy protections provided by any deployment of differential "},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1709.02753","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:35:40Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"xOCYqp5Vr6ObRGwH3/2I+X9W2ECmkBNlDXqbtXKS6hbsM4FJrwnLt1Pd9knh022+Uy6P0HvDjTiYsd8kub3vDA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-22T00:23:39.004676Z"},"content_sha256":"4ab5a5836cb1c9d15f0364fb370b790824de2bb9f41f14e9957d655a36455285","schema_version":"1.0","event_id":"sha256:4ab5a5836cb1c9d15f0364fb370b790824de2bb9f41f14e9957d655a36455285"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/LBYDEKH2EWJ5STNJ3UNCV56EXQ/bundle.json","state_url":"https://pith.science/pith/LBYDEKH2EWJ5STNJ3UNCV56EXQ/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/LBYDEKH2EWJ5STNJ3UNCV56EXQ/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-22T00:23:39Z","links":{"resolver":"https://pith.science/pith/LBYDEKH2EWJ5STNJ3UNCV56EXQ","bundle":"https://pith.science/pith/LBYDEKH2EWJ5STNJ3UNCV56EXQ/bundle.json","state":"https://pith.science/pith/LBYDEKH2EWJ5STNJ3UNCV56EXQ/state.json","well_known_bundle":"https://pith.science/.well-known/pith/LBYDEKH2EWJ5STNJ3UNCV56EXQ/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2017:LBYDEKH2EWJ5STNJ3UNCV56EXQ","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"f057a88ede1d813829bac88d47a6efa879101fde9fcacb5c3394ae5fc072f741","cross_cats_sorted":["cs.CY","cs.LG"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2017-09-08T16:00:14Z","title_canon_sha256":"7c773ea4f403ccc389245f814e8356ff31d144fc4929758905f4000d7aade20a"},"schema_version":"1.0","source":{"id":"1709.02753","kind":"arxiv","version":2}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1709.02753","created_at":"2026-05-18T00:35:40Z"},{"alias_kind":"arxiv_version","alias_value":"1709.02753v2","created_at":"2026-05-18T00:35:40Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1709.02753","created_at":"2026-05-18T00:35:40Z"},{"alias_kind":"pith_short_12","alias_value":"LBYDEKH2EWJ5","created_at":"2026-05-18T12:31:28Z"},{"alias_kind":"pith_short_16","alias_value":"LBYDEKH2EWJ5STNJ","created_at":"2026-05-18T12:31:28Z"},{"alias_kind":"pith_short_8","alias_value":"LBYDEKH2","created_at":"2026-05-18T12:31:28Z"}],"graph_snapshots":[{"event_id":"sha256:4ab5a5836cb1c9d15f0364fb370b790824de2bb9f41f14e9957d655a36455285","target":"graph","created_at":"2026-05-18T00:35:40Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"In June 2016, Apple announced that it will deploy differential privacy for some user data collection in order to ensure privacy of user data, even from Apple. The details of Apple's approach remained sparse. Although several patents have since appeared hinting at the algorithms that may be used to achieve differential privacy, they did not include a precise explanation of the approach taken to privacy parameter choice. Such choice and the overall approach to privacy budget use and management are key questions for understanding the privacy protections provided by any deployment of differential ","authors_text":"Aleksandra Korolova, Jun Tang, Xiaofeng Wang, Xiaolong Bai, Xueqiang Wang","cross_cats":["cs.CY","cs.LG"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2017-09-08T16:00:14Z","title":"Privacy Loss in Apple's Implementation of Differential Privacy on MacOS 10.12"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1709.02753","kind":"arxiv","version":2},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:7a160c7d3f60bb98406f09b4976033fb7755f63e4ed89fe2a6155c3a067956db","target":"record","created_at":"2026-05-18T00:35:40Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"f057a88ede1d813829bac88d47a6efa879101fde9fcacb5c3394ae5fc072f741","cross_cats_sorted":["cs.CY","cs.LG"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2017-09-08T16:00:14Z","title_canon_sha256":"7c773ea4f403ccc389245f814e8356ff31d144fc4929758905f4000d7aade20a"},"schema_version":"1.0","source":{"id":"1709.02753","kind":"arxiv","version":2}},"canonical_sha256":"58703228fa2593d94da9dd1a2af7c4bc11b9ea0be580d9de33614b836d96b2ca","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"58703228fa2593d94da9dd1a2af7c4bc11b9ea0be580d9de33614b836d96b2ca","first_computed_at":"2026-05-18T00:35:40.477351Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:35:40.477351Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"RbSyEeNpzcX0gHLgUOaaRePCaflLTFkp0EoeRDGtx9a/Zf7p3dh/7H6SiG1v7b3GL8dZA7e2Koy+bg7KNygFAA==","signature_status":"signed_v1","signed_at":"2026-05-18T00:35:40.478038Z","signed_message":"canonical_sha256_bytes"},"source_id":"1709.02753","source_kind":"arxiv","source_version":2}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:7a160c7d3f60bb98406f09b4976033fb7755f63e4ed89fe2a6155c3a067956db","sha256:4ab5a5836cb1c9d15f0364fb370b790824de2bb9f41f14e9957d655a36455285"],"state_sha256":"39a21656837417f86f4818ed00db26e4d5ee0920e58f5d5d8df6e1edd1919138"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"gEEedkW+VTFafV3xsJQsX+tXDffMJtoNfOp0MbnTvRw+ws4NKif+1z7CO7TqevXMd9qoqpMepYJyk4mE9RxEBA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-22T00:23:39.008078Z","bundle_sha256":"8d6ef4fb2162362e3454de3322b4035c3e29506aba844b230cef74094be874f0"}}