This category is dedicate to discussions about hardware-related efforts to improve trust assumptions in secure hardware that leverages remote attestation (TEE for short).
Today, there is no TEE available that gives the end user guarantees that their hardware does not contain a trojan of some form. The situation is so bad that in almost all cases even low-level software is kept hidden from the user, let alone the hardware design. Additionally, while some products like hardware wallets consider physical attackers in their threat model, performant TEEs require trust in the cloud provider or any other party who has physical access to the hardware.
Neither of these assumptions are acceptable over the long term.
For a quick introduction, here are a few overview posts written by our community: