MIT Sloan: Lead AI Adoption Across Your Organization — Not Just Pilot It
Lead AI Strategy with UCSB's Agentic AI Program — Microsoft Certified
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore the privacy and security implications of Apple Intelligence through comprehensive traffic analysis and OS inspection techniques in this DEF CON 33 conference talk. Examine how Apple's AI assistant handles user data flows, challenging the company's privacy claims about localized processing and data protection. Learn about unexpected behaviors and potential data leaks discovered through systematic analysis of encrypted traffic patterns and system interactions. Discover practical methodologies for scrutinizing AI-driven assistants using traffic analysis and operating system inspection techniques to identify security vulnerabilities. Understand the gap between marketing claims and actual data handling practices in modern AI systems, with specific focus on how Apple Intelligence accesses, processes, and transmits user information. Gain insights into the importance of independent security research when evaluating AI products before widespread adoption, particularly those marketed with strong privacy assurances. Acquire practical knowledge for both users and security professionals about identifying and analyzing potential privacy risks in AI-powered productivity tools through hands-on investigation techniques.
Syllabus
DEF CON 33 - AppleStorm - Unmasking the Privacy Risks of Apple Intelligence - Yoav Magid
Taught by
DEFCONConference