logoalt Hacker News

Stefan-Hyesterday at 7:54 PM1 replyview on HN

Just like your mobile device is one end of the end-to-end encryption, the TEE is the other end. If properly implemented, the TEE would measure all software and ensure that there are no side channels that the sensitive data could be read from.


Replies

paxysyesterday at 7:57 PM

By that logic SSL/TLS is also end-to-end encryption, except it isn't

show 1 reply