"Borrowing a Chicken to Lay Eggs"? Apple Secures Google Gemini License: Crafting the Strongest On-Device AI Through Model "Distillation"

marsbitPublicado a 2026-03-26Actualizado a 2026-03-26

Resumen

Apple has reportedly secured full access to Google's Gemini model, not for simple API integration, but to perform "model distillation"—a technique that allows Apple to train smaller, more efficient on-device AI models by learning from Gemini’s advanced reasoning processes. This approach enables Apple to develop localized AI systems that operate entirely on-device, improving speed and safeguarding user privacy. The distilled models are expected to power a significantly upgraded Siri in iOS 27, enabling deeper interaction, complex question-answering, document understanding, and practical task execution—all without requiring cloud connectivity. While leveraging Google’s model in the short term, Apple continues to develop its own foundational AI models internally, adopting a dual strategy of near-term collaboration and long-term independence. This move represents Apple’s effort to balance cutting-edge AI performance with its strict privacy and efficiency standards, potentially reshaping the landscape of on-device artificial intelligence.

To completely rid Siri of the "artificial stupidity" label, Apple has chosen a technical shortcut of "leveraging strength through borrowing."

According to the latest reports, Apple has obtained full access to the Google Gemini model. The core of this collaboration is not merely about API integration, but rather permits Apple to utilize Gemini's powerful computing capabilities for "model distillation," thereby tailoring smaller, smarter, localized AI models for its devices.

Technical "Distillation": Packing a Cloud Brain into the iPhone

The so-called "distillation" technology can be understood as having a "genius teacher" personally instruct an "average student":

Extracting the Essence: Apple queries the main Gemini model and obtains its detailed reasoning processes, allowing its self-developed smaller model to learn its internal computation methods.

Reducing Costs and Increasing Efficiency: After training, Apple's smaller model can achieve performance close to that of large cloud models with minimal computing power requirements.

Localized Security: These models can run on-device without needing an internet connection, enhancing response speed while perfectly upholding Apple's pride in user privacy.

See You in iOS 27: The New Generation Siri Receives a "Dimensionality Reduction Strike"

Leveraging this collaborative framework, the new Siri expected to launch with iOS 27 will possess completely revamped capabilities:

Deep Interaction: Able to answer complex questions, provide emotional support, and even tell stories to users.

All-in-One Assistant: Equipped with practical operational abilities like scanning and understanding documents, summarizing information, and booking travel with one click.

Highly Customized: Apple has the right to edit and adjust Gemini to ensure its response style highly aligns with the Apple user experience.

Walking on Two Legs: Apple Never Gave Up "Going It Alone"

Although currently relying on Google's support for "intelligence," Apple has not put all its eggs in one basket.

Its internal Apple Foundation Models team is still pushing forward with full force on independent, self-developed AI models. This indicates Apple is adopting a strategy of "short-term borrowing, long-term self-reliance," quickly capturing the market using third-party mature technology while building its own core foundational model system.

From cloud "distillation" to local operation, Apple is attempting to find that perfect balance between privacy, efficiency, and cutting-edge AI capability through this unique approach. When your iPhone possesses an offline "Gemini-level" brain, the AI competition in mobile devices will truly have entered the second half.

Preguntas relacionadas

QWhat is the core of the collaboration between Apple and Google Gemini?

AApple has obtained full access to Google's Gemini model, allowing it to use 'model distillation' to create smaller, smarter on-device AI models.

QHow does the 'distillation' technology work in this context?

AIt involves Apple using the full Gemini model to generate detailed reasoning processes, which its smaller models then learn from, enabling high performance with low computational demands.

QWhat are the expected capabilities of the new Siri in iOS27?

AIt is expected to handle complex queries, provide emotional support, tell stories, scan and understand documents, summarize information, and perform tasks like booking travel, all while running locally on the device.

QWhy is Apple pursuing this collaboration instead of relying solely on its own AI development?

AApple is adopting a 'short-term borrowing, long-term self-development' strategy, using third-party technology to quickly enter the market while continuing to develop its own core foundation models internally.

QWhat are the main benefits of running AI models locally on devices like the iPhone?

ALocal operation improves response speed, reduces the need for cloud connectivity, and enhances user privacy by keeping data on the device.

Lecturas Relacionadas

North Korean Hackers Loot $500 Million in a Single Month, Becoming the Top Threat to Crypto Security

North Korean hackers, particularly the notorious Lazarus Group and its subgroup TraderTraitor, have stolen over $500 million from cryptocurrency DeFi platforms in less than three weeks, bringing their total theft for the year to over $700 million. Recent major attacks on Drift Protocol and KelpDAO, resulting in losses of approximately $286 million and $290 million respectively, highlight a strategic shift: instead of targeting core smart contracts, attackers are now exploiting vulnerabilities in peripheral infrastructure. For instance, the KelpDAO attack involved compromising downstream RPC infrastructure used by LayerZero's decentralized validation network (DVN), allowing manipulation without breaching core cryptography. This sophisticated approach mirrors advanced corporate cyber-espionage. Additionally, North Korea has systematically infiltrated the global crypto workforce, with an estimated 100 operatives using fake identities to gain employment at blockchain companies, enabling long-term access to sensitive systems and facilitating large-scale thefts. According to Chainalysis, North Korean-linked hackers stole a record $2 billion in 2025, accounting for 60% of all global crypto theft that year. Their total historical crypto theft has reached $6.75 billion. Post-theft, they employ specialized money laundering methods, heavily relying on Chinese OTC brokers and cross-chain mixing services rather than standard decentralized exchanges. Security experts, while acknowledging the increased sophistication, emphasize that many attacks still exploit fundamental weaknesses like poor access controls and centralized operational risks. Strengthening private key management, limiting privileged access, and enhancing coordination among exchanges, analysts, and law enforcement immediately after an attack are critical to improving defense and fund recovery chances. The industry's challenge now extends beyond secure smart contracts to safeguarding operational security at the infrastructure level.

marsbitHace 52 min(s)

North Korean Hackers Loot $500 Million in a Single Month, Becoming the Top Threat to Crypto Security

marsbitHace 52 min(s)

Circle CEO's Seoul Visit: No Korean Won Stablecoin Issuance, But Met All Major Korean Banks

Circle CEO Jeremy Allaire's recent activities in Seoul indicate a strategic shift for the company, moving away from issuing a Korean won-backed stablecoin and instead focusing on embedding itself as a key infrastructure provider within Korea’s financial and crypto ecosystem. Despite Korea accounting for nearly 30% of global crypto trading volume—with a market characterized by high retail participation and altcoin dominance—Circle has chosen not to compete for the role of stablecoin issuer. Instead, Allaire met with major Korean banks (including Shinhan, KB, and Woori), financial groups, leading exchanges (Upbit, Bithumb, Coinone), and tech firms like Kakao. This approach reflects a broader industry transition: the core of stablecoin competition is shifting from issuance rights to systemic positioning. With Korean regulators still debating whether banks or tech companies should issue stablecoins, Circle is avoiding regulatory uncertainty by strengthening its role as a service and technology partner. The company is deepening integration with trading platforms, building connections, and promoting stablecoin infrastructure. This positions Circle to benefit regardless of which entity eventually issues a won stablecoin. Allaire also noted the potential for a Chinese yuan stablecoin in the next 3–5 years, underscoring a regional trend of stablecoins becoming more regulated and integrated with traditional finance. Ultimately, Circle’s strategy highlights that future influence in the stablecoin market will belong not necessarily to the issuers, but to the foundational infrastructure layers that enable cross-system transactions.

marsbitHace 1 hora(s)

Circle CEO's Seoul Visit: No Korean Won Stablecoin Issuance, But Met All Major Korean Banks

marsbitHace 1 hora(s)

SpaceX Ties Up with Cursor: A High-Stakes AI Gambit of 'Lock First, Acquire Later'

SpaceX has secured an option to acquire AI programming company Cursor for $60 billion, with an alternative clause requiring a $10 billion collaboration fee if the acquisition does not proceed. This structure is not merely a potential acquisition but a strategic move to control core access points in the AI era. The deal is designed as a flexible, dual-path arrangement, allowing SpaceX to either fully acquire Cursor or maintain a binding partnership through high-cost collaboration. This "option-style" approach minimizes immediate regulatory and integration risks while ensuring long-term alignment between the two companies. At its core, the transaction exchanges critical AI-era resources: SpaceX provides its Colossus supercomputing cluster—one of the world’s most powerful AI training infrastructures—while Cursor contributes its AI-native developer environment and strong product adoption. This synergy connects compute power, models, and application layers, forming a closed-loop AI capability stack. Cursor, founded in 2022, has achieved rapid growth with over $1 billion in annual revenue and widespread enterprise adoption. Its value lies in transforming software development through AI agents capable of coding, debugging, and system design—positioning it as a gateway to future software production. For SpaceX, this move is part of a broader strategy to evolve from a aerospace company into an AI infrastructure empire, integrating xAI, supercomputing, and chip manufacturing. Controlling Cursor fills a gap in its developer tooling layer, strengthening its AI narrative ahead of a potential IPO. The deal reflects a shift in AI competition from model superiority to ecosystem and entry-point control. With programming tools as a key battleground, securing developer loyalty becomes crucial for dominating the software production landscape. Risks include questions around Cursor’s valuation, technical integration challenges, and potential regulatory scrutiny. Nevertheless, the deal underscores a strategic bet: controlling both compute and software development access may redefine power dynamics in the AI-driven future.

marsbitHace 2 hora(s)

SpaceX Ties Up with Cursor: A High-Stakes AI Gambit of 'Lock First, Acquire Later'

marsbitHace 2 hora(s)

Trading

Spot
Futuros

Artículos destacados

Cómo comprar T

¡Bienvenido a HTX.com! Hemos hecho que comprar Threshold Network Token (T) sea simple y conveniente. Sigue nuestra guía paso a paso para iniciar tu viaje de criptos.Paso 1: crea tu cuenta HTXUtiliza tu correo electrónico o número de teléfono para registrarte y obtener una cuenta gratuita en HTX. Experimenta un proceso de registro sin complicaciones y desbloquea todas las funciones.Obtener mi cuentaPaso 2: ve a Comprar cripto y elige tu método de pagoTarjeta de crédito/débito: usa tu Visa o Mastercard para comprar Threshold Network Token (T) al instante.Saldo: utiliza fondos del saldo de tu cuenta HTX para tradear sin problemas.Terceros: hemos agregado métodos de pago populares como Google Pay y Apple Pay para mejorar la comodidad.P2P: tradear directamente con otros usuarios en HTX.Over-the-Counter (OTC): ofrecemos servicios personalizados y tipos de cambio competitivos para los traders.Paso 3: guarda tu Threshold Network Token (T)Después de comprar tu Threshold Network Token (T), guárdalo en tu cuenta HTX. Alternativamente, puedes enviarlo a otro lugar mediante transferencia blockchain o utilizarlo para tradear otras criptomonedas.Paso 4: tradear Threshold Network Token (T)Tradear fácilmente con Threshold Network Token (T) en HTX's mercado spot. Simplemente accede a tu cuenta, selecciona tu par de trading, ejecuta tus trades y monitorea en tiempo real. Ofrecemos una experiencia fácil de usar tanto para principiantes como para traders experimentados.

541 Vistas totalesPublicado en 2024.12.10Actualizado en 2025.03.21

Cómo comprar T

Discusiones

Bienvenido a la comunidad de HTX. Aquí puedes mantenerte informado sobre los últimos desarrollos de la plataforma y acceder a análisis profesionales del mercado. A continuación se presentan las opiniones de los usuarios sobre el precio de T (T).

活动图片