Secure Enclaves and TPMs

Trusted Execution Environments

Modern phones and laptops utilize Secure Enclaves—micro-processors completely sequestered from the main operating system memory containing hardcoded, unextractable root keys.

When you use Biometrics mapping to your device, the main processor asks the Secure Enclave to handle the cryptography. Because the OS physically cannot read the enclave RAM, malware cannot export your vault credentials.

FIDO2 and WebAuthn

Secure Enclaves power the modern WebAuthn open standard. When you register a biometric passkey on a website, the enclave generates a new asymmetric keypair. The Private Key never leaves the enclave. When the site challenges your browser, the enclave asserts its identity purely through hardware signatures.

Everyday Example

Your smartphone is a giant office building full of thousands of workers (apps). A secure enclave is an impenetrable, windowless vault sitting in the basement. Apps can slide requests under the door, and the vault will slide answers back out. But no app, not even the building manager (the operating system), is allowed to physically walk inside.

The Deep Mathematics

Trusted Execution Environments (TEEs) isolate their SRAM footprint using hardware-enforced memory controllers. Page tables map exclusively outside the OS kernel reach, preventing direct memory access (DMA) attacks. They hold silicon-fused asymmetric private keys generating cryptographically valid attestation proofs shielding against OS-level malware escalations.

Discover how giovium protects your data

giovium leverages these very cryptographic principles to keep your passwords, files, and secrets completely safe. Try it for free on any platform.

Download giovium