TEEP -- A Protocol for Dynamic Trusted Execution Environment Enablement | |
|
|
About TEEP | |
Chips used on smart phones, tablets, and many consumer appliances today have built-in support for a so-called Trusted Execution Environment (TEE). The TEE is a security concept that separates normal operating systems, like Linux, from code that requires higher security protection, like security-related code. The underlying idea of this sandboxing approach is to have smaller code that is better reviewed and test and to provide it with more rights. They run on the so-called Secure World (in comparison to the Linux operating system that would run in the Normal World).
To see the collection of prior postings to the list, visit the TEEP Archives. |
|
Using TEEP | |
To post a message to all the list members, send email to
teep@ietf.org.
You can subscribe to the list, or change your existing subscription, in the sections below. |
|
Subscribing to TEEP | |
Subscribe to TEEP by filling out the following form. You will be sent email requesting confirmation, to prevent others from gratuitously subscribing you. This is a private list, which means that the list of members is not available to non-members. | |
TEEP Subscribers | |
|
![]() version 2.1.39 |
![]() |
![]() |