Frequently, hardware implements TEEs, making it difficult for attackers to compromise the software working within them. With hardware-primarily based TEEs, we reduce the TCB towards the components as well as Oracle application operating around the TEE, not the whole computing stacks in the Oracle technique. Approaches to real-item authentication:Yo