Although the diagram over exemplifies a TEE having an running method (Trusted OS), we could just Have got a bare-metal firmware exposing an interface with distinctive use of specific components methods.
" however, https://laracxza559530.elbloglibre.com/30225190/considerations-to-know-about-confidential-computing