pith. sign in

arxiv: 1709.02753 · v2 · pith:LBYDEKH2new · submitted 2017-09-08 · 💻 cs.CR · cs.CY· cs.LG

Privacy Loss in Apple's Implementation of Differential Privacy on MacOS 10.12

classification 💻 cs.CR cs.CYcs.LG
keywords privacyappledatalossdifferentialdifferentiallyprivateuser
0
0 comments X
read the original abstract

In June 2016, Apple announced that it will deploy differential privacy for some user data collection in order to ensure privacy of user data, even from Apple. The details of Apple's approach remained sparse. Although several patents have since appeared hinting at the algorithms that may be used to achieve differential privacy, they did not include a precise explanation of the approach taken to privacy parameter choice. Such choice and the overall approach to privacy budget use and management are key questions for understanding the privacy protections provided by any deployment of differential privacy. In this work, through a combination of experiments, static and dynamic code analysis of macOS Sierra (Version 10.12) implementation, we shed light on the choices Apple made for privacy budget management. We discover and describe Apple's set-up for differentially private data processing, including the overall data pipeline, the parameters used for differentially private perturbation of each piece of data, and the frequency with which such data is sent to Apple's servers. We find that although Apple's deployment ensures that the (differential) privacy loss per each datum submitted to its servers is $1$ or $2$, the overall privacy loss permitted by the system is significantly higher, as high as $16$ per day for the four initially announced applications of Emojis, New words, Deeplinks and Lookup Hints. Furthermore, Apple renews the privacy budget available every day, which leads to a possible privacy loss of 16 times the number of days since user opt-in to differentially private data collection for those four applications. We advocate that in order to claim the full benefits of differentially private data collection, Apple must give full transparency of its implementation, enable user choice in areas related to privacy loss, and set meaningful defaults on the privacy loss permitted.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Forward citations

Cited by 2 Pith papers

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. Auditing Apple's DifferentialPrivacy.framework: Implementation Bugs, Misconfigurations, and Practical Risks

    cs.CR 2026-05 conditional novelty 7.0

    Client-side audit of Apple's closed-source DP framework finds floating-point sampler bugs and misconfigurations that violate DP guarantees in 5 of 9 mechanisms, affecting 87% of data collection on Sonoma and 68% on Sequoia.

  2. Large-Sample Bayesian Approximations for Privatized Data

    stat.ME 2026-04 unverdicted novelty 6.0

    A two-step approximate Bayesian sampler for privatized data is shown to be asymptotically valid under mild assumptions, with conservative frequentist properties in simulations and an application to 2022 American Commu...