How to distribute Android mobile app functionality between OS, Trusted Execution Environment (TEE) and Secure Element (SE)?

There are different scenarios when it’s about secure computation/storage on mobile devices, e.g., "REE only", "REE + TEE", or "REE + SE" or "REE + TEE + SE".
REE – Real Execution Environment, i.e. de… Continue reading How to distribute Android mobile app functionality between OS, Trusted Execution Environment (TEE) and Secure Element (SE)?

What is the difference betwen a Trusted Computing Base and a Root of Trust?

What is the difference betwen a Trusted Computing Base (TCB) and a Root of Trust (RoT)? Can both terms be used interchangeably?
A TCB is defined by the NIST as follows:

Totality of protection mechanisms within a computer system, including… Continue reading What is the difference betwen a Trusted Computing Base and a Root of Trust?

Would confidential computing/hardware-based TEE be the missing security jigsaw puzzle to counter data exfiltration?

Is confidential computing/hardware-based trusted execution environment (TEE) the missing security jigsaw puzzle to counter data exfiltration?
Today, we already have data encrypted at rest and data encrypted in transit (TLS) widely adopted…. Continue reading Would confidential computing/hardware-based TEE be the missing security jigsaw puzzle to counter data exfiltration?

What really is the difference between firmware TPM and a discreet one and should it be trusted more?

what really is the difference between a physical TPM and any implementation of a fTPM? I get that both adhere to the same specification and in my mind should be the same thing, but then, what is the advantage of the physical chip over firm… Continue reading What really is the difference between firmware TPM and a discreet one and should it be trusted more?