Trusted Execution Environments are interesting technology. There are a few research papers detailing how they can be attacked—aside from the obvious risk that the TEE manufacturer holds the keys and could, if compelled or willing, share access with others.
In practice, TEEs represent strong privacy guarantees. For businesses handling sensitive data, TEEs allow you to credibly claim that the data is protected during processing, even when computation happens in the cloud.
Trusted Execution Environments are interesting technology. There are a few research papers detailing how they can be attacked—aside from the obvious risk that the TEE manufacturer holds the keys and could, if compelled or willing, share access with others.
In practice, TEEs represent strong privacy guarantees. For businesses handling sensitive data, TEEs allow you to credibly claim that the data is protected during processing, even when computation happens in the cloud.
I’m not sure how this is any more robust than any other privacy guarantee from a cloud provider
Rule of thumb for knowing if your data is private: Unless you can physically destroy the drives/tapes/film yourself personally it’s not private