Secure Enclaves and TPMs
Trusted Execution Environments
Modern phones and laptops utilize Secure Enclaves—micro-processors completely sequestered from the main operating system memory containing hardcoded, unextractable root keys.
When you use Biometrics mapping to your device, the main processor asks the Secure Enclave to handle the cryptography. Because the OS physically cannot read the enclave RAM, malware cannot export your vault credentials.
FIDO2 and WebAuthn
Secure Enclaves power the modern WebAuthn open standard. When you register a biometric passkey on a website, the enclave generates a new asymmetric keypair. The Private Key never leaves the enclave. When the site challenges your browser, the enclave asserts its identity purely through hardware signatures.
Everyday Example
Your smartphone is a giant office building full of thousands of workers (apps). A secure enclave is an impenetrable, windowless vault sitting in the basement. Apps can slide requests under the door, and the vault will slide answers back out. But no app, not even the building manager (the operating system), is allowed to physically walk inside.
The Deep Mathematics
Trusted Execution Environments (TEEs) isolate their SRAM footprint using hardware-enforced memory controllers. Page tables map exclusively outside the OS kernel reach, preventing direct memory access (DMA) attacks. They hold silicon-fused asymmetric private keys generating cryptographically valid attestation proofs shielding against OS-level malware escalations.
Discover how giovium protects your data
giovium leverages these very cryptographic principles to keep your passwords, files, and secrets completely safe. Try it for free on any platform.
Download giovium