Even though the diagram earlier mentioned exemplifies a TEE with the functioning technique (Trusted OS), we could just have a bare-steel firmware exposing an interface with special access to certain hardware https://sachinvufr737897.blazingblog.com/29777405/anti-ransom-software-for-dummies