Source: Hacker News
Article note: All of these TEE/Secure Enclave/Whatever name you prefer mechanisms have always seemed suspect to me.
It's just an extra computer that shares some resources with the host, the same "Physical access means game over" rules apply, PLUS there are cross-contamination risks that a more weakly connected device don't have (albeit then you can't use the same device as a crypto accelerator).
Comments
