The code executed during the trusted execution environment can not be considered or modified, so an attacker would only be able to execute malicious code with total privileges on exactly the same processor.
• https://charliebuwn310406.shivawiki.com/user