Although the diagram earlier mentioned exemplifies a TEE with the functioning procedure (Trusted OS), we could just Use a bare-steel firmware exposing an interface with exceptional access to selected hardware https://janeslyi126487.tokka-blog.com/30531784/what-does-encrypting-data-in-use-mean