Even though the diagram previously mentioned exemplifies a TEE with an functioning process (Trusted OS), we could just Use a bare-steel firmware exposing an interface with distinctive access to specific components https://lilianedce013890.bloginder.com/30582296/what-does-encrypting-data-in-use-mean