Typically, hardware implements TEEs, rendering it tough for attackers to compromise the program working inside them. With components-based TEEs, we decrease the TCB towards the hardware plus the Oracle computer software running about the TEE, not the entire computing stacks of your Oracle program. Ways to real-object authentication:Are there likely