๐ŸŒŒ
Privacy Village Academy
Join The Community!AcademyAbout HGPE
  • Hitchhiker's Guide to Privacy Engineering
    • โ“What is HGPE?
      • โš–๏ธWho is this for?
      • ๐Ÿง™โ€โ™‚๏ธPrivacy Engineering
      • ๐ŸŽจCreative Privacy
      • ๐Ÿ”ฎGenerative AI
      • ๐Ÿง‘โ€๐Ÿ’ปAbout the Author
  • ๐Ÿง™โ€โ™‚๏ธThe Ethical AI Governance Playbook 2025 Edition
    • ๐Ÿค–Chapter 1 : AI Literacy
    • ๐ŸŒChapter 2 : AI Governance in the 21st Century
    • โŒ›Chapter 3 - Getting Started with AI Act Compliance
    • ๐Ÿš€Chapter 4 : Rise of AI Governance: Building Ethical & Compliant AI
    • Chapter 5 : Introduction to the Lifecycle of AI
  • ๐ŸŽ“Privacy Engineering Field Guide Season 1
    • โ“Decoding the Digital World: Exploring Everyday Technology
    • ๐Ÿ‘๏ธIntroduction: Why Privacy Matters?
      • Age of Mass Surveillance
      • Privacy & Democracy
      • Privacy & Government Surveillance
    • โšกChapter 1 : How Computers Work?
      • Electricity
      • Bits
      • Logic Gates
      • Central Processing Unit (CPU)
      • Graphic Processing Unit (GPU)
      • Motherboard
      • Data Storage
      • Databases
      • Operating System (OS)
      • Computer Code
      • Programming Languages
      • The File System
      • Bugs and Errors
      • Computer Virus
      • Internet of Things (IoT)
      • Cloud Computing
    • ๐Ÿ›ฐ๏ธChapter 2 : How the internet works?
      • Physical Infrastructure
      • Network and Protocols
      • Switch
      • Routers
      • IP Address
      • Domain Name System (DNS)
      • Mac Address
      • TCP / IP
      • OSI Model
      • Packets
      • The Client - Server Architecture
      • Secure Socket Shell (SSH)
      • Transport Layer Security (TLS)
      • Firewall
      • Tunnels and VPNs
      • Proxy Server
    • ๐Ÿ–ฅ๏ธChapter 3 : How Websites Work?
      • HTML
      • CSS
      • Javascript
      • Web Server
      • Browser
      • HTTP
      • Databases
      • Front End (Client Side)
      • Back End (Server Side)
      • Cookies
      • Local Storage
      • Session Storage
      • IndexedDB
      • XHR Requests
      • Web APIs
      • Webhooks
      • Email Server
      • HTTPS
      • Web Application Firewall
      • Single Sign-on (SS0)
      • OAuth 2.0
      • Pixels
      • Canvas Fingerprinting
      • Email Tracking
      • Containers
      • CI/CD
      • Kubernetes
      • Serverless Architecture
    • โš›๏ธChapter 4 : How Quantum Computers Work?
      • Quantum Properties
      • Quantum Bits (Qubits)
      • Decoherence
      • Quantum Circuits
      • Quantum Algorithms
      • Quantum Sensing
      • Post-Quantum Cryptography
    • ๐Ÿ“ณChapter 5 : Mobile Apps and Privacy
      • Battery
      • Processor
      • Mobile Operating Systems
      • Mobile Data Storage
      • Cellular Data
      • Mobile Device Sensors
      • Wireless Connectivity
      • Camera & Microphone
      • Mobile Apps
      • Software Development Kits (SDKs)
      • Mobile Device Identifiers
      • Bring Your Own Device (BYOD)
  • ๐Ÿ•ต๏ธโ€โ™‚๏ธPrivacy Engineering Field Guide Season 2
    • โ“Introduction to Privacy Engineering for Non-Techs
      • ๐ŸŽญChapter 1 : Digital Identities
        • What is identity?
        • Authentication Flows
        • Authentication vs. Authorization
        • OAuth 2.0
        • OpenID Connect (OIDC)
        • Self Sovereign Identities
        • Decentralized Identifiers
        • eIDAS
      • ๐Ÿ‘๏ธโ€๐Ÿ—จ๏ธChapter 2 : De-Identification
        • Introduction to De-Identification?
        • Input / Output Privacy
        • De-identification Strategies
        • K-Anonymity
        • Differential Privacy
        • Privacy Threat Modeling
  • ๐Ÿ“–HGPE Story and Lore
    • ๐ŸชฆChapter 1 : The Prologue
    • โ˜„๏ธChapter 2 : Battle for Earth
    • ๐Ÿฆ Chapter 3 : A Nightmare To Remember
    • ๐Ÿง™โ€โ™‚๏ธChapter 4 : The Academy
    • ๐ŸŒƒChapter 5: The Approaching Darkness
    • โš”๏ธChapter 6 : The Invasion
    • ๐ŸฐChapter 7 : The Fall of the Academy
    • ๐Ÿ›ฉ๏ธChapter 8 : The Escape
    • ๐ŸชChapter 9 : The Moon Cave
    • ๐Ÿฆ‡Chapter 10: Queen of Darkness
  • ๐Ÿ“บVideos, Audio Book and Soundtracks
    • ๐ŸŽงReading Episodes
    • ๐ŸŽนSoundtracks
  • ๐Ÿ‘พHGPE Privacy Games and Challenges
    • ๐ŸŽฎData Privacy Day'23 / Privacy Treasure Hunt Game
    • ๐ŸงฉPrivacy Quest
  • ๐Ÿ“ฌSubscribe Now!
Powered by GitBook
On this page
  • What is a CPU?
  • How does it work?
  • What are processor types?
  • Privacy and Processors

Was this helpful?

  1. Privacy Engineering Field Guide Season 1
  2. Chapter 1 : How Computers Work?

Central Processing Unit (CPU)

At the hardware level a CPU is also known as a chip.

PreviousLogic GatesNextGraphic Processing Unit (GPU)

Last updated 2 years ago

Was this helpful?

What is a CPU?

Ah, the CPU, or Central Processing Unit, is the heart and brain of every computer, the powerhouse that drives our digital lives.

It is like the conductor of a vast orchestra, directing the flow of electrons through millions of tiny pathways.

The CPU is a complex and remarkable technology, made up of millions of tiny transistors that work together to process information. It is responsible for carrying out the instructions of computer programs, from basic arithmetic calculations to complex machine learning algorithms.

But what makes the CPU truly special is its ability to multitask, to juggle multiple programs and processes at once.

It does this by rapidly switching between tasks, each time picking up where it left off, like a virtuoso musician playing multiple instruments at once.

How does it work?

The Central Processing Unit, or processor, is a component that acts as the brain of a computer system.

We can put together seemingly simple devices like logic gates to create CPUs that power complex devices like our spaceships, cyborgs and computers.

CPU consists of physical devices, like the chip and transistors that are used for creating logic circuits and gates.

A CPU performs functions related to input and output, processing and storage of data for a computer system. It is the main control center for all operations that happen in a computer system.

What are processor types?

Single Core: These are the oldest types of CPUs. They have a single core that is used for processing all instructions and information.

Dual-Core: These CPUs contain two cores within an available Integrated Circuit (IC).

Quad-Core: These types of CPUs have two dual-core processors within a single integrated circuit.

Privacy and Processors

Did you know Apple's Secure Enclave allows iPhones and Macs with Touch ID or Face ID to use a separate processor to handle your biometric information?

The Secure Enclave boots separately from the rest of your device. It runs its own microkernel, which is not directly accessible by your operating system or any programs running on your device. It is also never synced to the cloud or even directly seen by your deviceโ€™s primary operating system.

Itโ€™s a collection of millions of that can be manipulated to perform an awesome variety of calculations.

When the CPU receives an instruction presented in , the instruction is converted into signals that each part of the processor can work on. Finally, after the instruction is decoded, it is executed.

At the hardware level, a CPU is an , also known as a chip. An integrated circuit "integrates" millions of tiny electrical parts, arranging them into circuits.

This privacy-enhancing technology is called the Secure Enclave, itโ€™s basically an entire computer unto itself, and it offers a variety of security features.

transistors
binary form
integrated circuit
patented by Apple
๐ŸŽ“
โšก
At the end of the second century of the Battle for Earth, engineers came up with a solution that will provide a final blow to the machines that inhabit the Earth. One day during the creation of this ultimate weapon of mass destruction, messing with the wrong genetic code lead to unintended consequences. - Journals of Order of Epoch, 2213 Anno Domini
Page cover image