Crypto Bug in Samsung Galaxy Devices: Breaking Trusted Execution Environments (TEEs)
Published in
5 min readMar 5, 2022
If you use an Apple Macbook, it’s likely that you have a secret enclave for important secrets — such as your encryption keys. These keys define the core of the trust infrastructure on the device — and protect applications from stealing these secrets. The TEE also allows isolation between code which is fully trusted, and code that cannot be fully…