The code executed while in the trusted execution environment can not be seen or modified, so an attacker would only have the capacity to execute destructive code with whole privileges on the exact same processor.
where https://fraserrnur472942.blogscribble.com/profile