How to distribute Android mobile app functionality between OS, Trusted Execution Environment (TEE) and Secure Element (SE)?

There are different scenarios when it’s about secure computation/storage on mobile devices, e.g., "REE only", "REE + TEE", or "REE + SE" or "REE + TEE + SE".
REE – Real Execution Environment, i.e. de… Continue reading How to distribute Android mobile app functionality between OS, Trusted Execution Environment (TEE) and Secure Element (SE)?

What is the difference betwen a Trusted Computing Base and a Root of Trust?

What is the difference betwen a Trusted Computing Base (TCB) and a Root of Trust (RoT)? Can both terms be used interchangeably?
A TCB is defined by the NIST as follows:

Totality of protection mechanisms within a computer system, including… Continue reading What is the difference betwen a Trusted Computing Base and a Root of Trust?

Would confidential computing/hardware-based TEE be the missing security jigsaw puzzle to counter data exfiltration?

Is confidential computing/hardware-based trusted execution environment (TEE) the missing security jigsaw puzzle to counter data exfiltration?
Today, we already have data encrypted at rest and data encrypted in transit (TLS) widely adopted…. Continue reading Would confidential computing/hardware-based TEE be the missing security jigsaw puzzle to counter data exfiltration?