> "Hardware-backed" means "in ARM TrustZone" on all existing devices. Since > TrustZone isn't separate hardware but a secure mode of the main CPU [...]
I recall an Intel engineer talking at a UEFI security event, saying that TZ is firmware-based software-based, whereas TPM is hardware-based and more secure than TZ. (From UEFI security POV, not Android-centric). If anyone has a pointer to the official TZ docs that clarify how they implement their code, and how secure it is compared to TPM, I'd appreciate it. Thanks. -- You received this message because you are subscribed to the Google Groups "Android Security Discussions" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To post to this group, send email to [email protected]. Visit this group at http://groups.google.com/group/android-security-discuss. For more options, visit https://groups.google.com/d/optout.
