This is the second part of a blog series covering my security research into Samsung’s TrustZone . Other parts in this series so far: 1, 3.