Hardware root of trust, Hardware security primitives
Specialized crypto ops vs small open/generic TCB.
Chain of trust, up to firmware and software layer. Level of integration vs modularity.
TouchID with SE . Samsung. Yubikey, Gemalto,
Electronic logging devices. ELD tamper proofing
Secure provisioning. Intel EPID
Rust, memory safey, cargo, toml, policy engine, fortanix, azure IoT
Key management with enclaves
Trusted VMs and cloud security
Isolated memory on shared infra