Normally, hardware implements TEEs, rendering it complicated for attackers to compromise the computer software running inside them. With hardware-based mostly TEEs, we decrease the TCB to your hardware as well as the Oracle application working about the TEE, not the whole computing stacks of your Oracle technique. Ways to real-object authentication