Often, hardware implements TEEs, rendering it difficult for attackers to compromise the software package operating within them. With hardware-based mostly TEEs, we reduce the TCB for the components as well as the Oracle software package operating to the TEE, not all the computing stacks from the Oracle process. Methods to real-item authentication:D