Although the diagram earlier mentioned exemplifies a TEE having an functioning technique (Trusted OS), we could just Use a bare-steel firmware exposing an interface with unique access to selected components https://jonasauwl026999.blogsmine.com/31097269/confidential-computing-enclave-an-overview