Of course, exactly how secure Apple’s version of differential privacy will be depends on how Apple actually plans to implement it. For now, Apple has offered up no details. While Apple previously kept all of your data on your device, the new iOS features will now be analyzing user data in aggregate.

Advertisement

Apple explained differential privacy in an email to Gizmodo:

Starting with iOS 10, Apple is using Differential Privacy technology to help discover the usage patterns of a large number of users without compromising individual privacy. To obscure an individual’s identity, Differential Privacy adds mathematical noise to a small sample of the individual’s usage pattern. As more people share the same pattern, general patterns begin to emerge, which can inform and enhance the user experience. In iOS 10, this technology will help improve QuickType and emoji suggestions, Spotlight deep link suggestions and Lookup Hints in Notes.

Advertisement

“So the question is, what kind of data, and what kind of measurements are they applying it to, and what are they doing with it,” Green told Gizmodo. “It’s a really neat idea, but I’ve never really seen it deployed. It ends up being a tradeoff between accuracy of the data you are collecting and privacy.”

“The accuracy goes down as the privacy goes up, and the tradeoffs I’ve seen have never been all that great,” Green continued. “[Again] I’ve never really heard of anyone deploying it in a real product before. So if Apple is doing this they’ve got a custom implementation, and they made all the decisions themselves.”

Advertisement

After developing its differential privacy technology, Apple showed it to Aaron Roth, an associate professor of computer science at the University of Pennsylvania. Roth offered a complimentary but vague statement that Apple displayed during the keynote:

Advertisement

But we won’t really know how well this new feature protects your privacy until Apple provides more details on how it’s done. We do know that Apple is opening up its software more than ever, and we can assume that many hackers will try to find new ways to break through its historically strong security.