[Replicant] Trustonic TEE in Samsung SoCs

Bob Summerwill bob at summerwill.net
Tue Mar 1 20:30:49 UTC 2016


Thanks for the info, blibbet.

My Intel ME "notorious" comment is mainly based on the issues raised in
https://libreboot.org/faq/#intel.


On Tue, Mar 1, 2016 at 11:02 AM, Blibbet <blibbet at gmail.com> wrote:

>
> On 02/29/2016 09:16 PM, Bob Summerwill wrote:
> [...]
> > * Samsung KNOX, using Trustonic's TEE (
> > https://www.trustonic.com/technology/trusted-execution-environment)
> which
> > sounds much like the notorious Intel ME to me.    Does anybody here have
> > experience of Trustonic TEE, and can confirm that. or explain what it
> does
> > better than me?    I think it's more proprietary software on-silicon,
> which
> > constrains what you can run on your own device.
> [..]
>
> https://en.wikipedia.org/wiki/Trusted_execution_environment#Implementations
>
> Most ARM chips have TrustZone or some other TEE. Most Intel systems have
> a Mangement Engine.  Most AMD systems have a Platform Security
> Processor. There are open source implementations of TEE, like OP-TEE.
> TEEs protect 'untrusted' software stacks (Windows, Linux, Android,
> etc.). It can be helpful for security, and may also be misused by
> attackers to abuse security and privacy. It is 'notorious' if you want
> to reconfigure a system in a way that the vendor would consider
> something more a security attack than a normal use case of a consumer. :-(
>
>
> _______________________________________________
> Replicant mailing list
> Replicant at lists.osuosl.org
> http://lists.osuosl.org/mailman/listinfo/replicant
>



-- 
bob at summerwill.net
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.osuosl.org/pipermail/replicant/attachments/20160301/f4e67477/attachment.html>


More information about the Replicant mailing list