Even though the diagram earlier mentioned exemplifies a TEE with the operating program (Trusted OS), we could just have a bare-steel firmware exposing an interface with distinctive access to specified components https://heathquod891170.bloggactif.com/32072284/the-best-side-of-confidential-computing