Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Trustzone is different, although it can be used to wall things off from the user (and their viruses) it's more of a secure hypervisor, or way of constructing a TPM-equivalent that shares chip resources.

If you have control over the boot process on an ARM chip, you don't have to enable Trustzone.



Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: