Even though the diagram over exemplifies a TEE using an running system (Trusted OS), we could just Possess a bare-metallic firmware exposing an interface with exclusive usage of specified components methods.
nowadays, https://haarisupec035287.xzblogs.com/71507792/little-known-facts-about-confidential-computing-enclave