Intel and AMD trusted enclaves, a foundation for network security, fall to physical attacks
Intel and AMD trusted enclaves, a foundation for network security, fall to physical attacks

arstechnica.com
Intel and AMD trusted enclaves, a foundation for network security, fall to physical attacks

The communication channel between the main processor and the TPM is the easiest point of attack. The Chip Whisperer has been able to do this for years. Once someone gets their hands on the hardware, all bets are off.
Don't see how this is new?
New clicks!
Well not only, there are still industry solutions relying on this infra, going "state actors in our data center are not a threat".....
From Signal Messenger of all places....
I remember one intel technology was pretty thoroughly tested and field proven, (and had significant memory constraints since almost everything happened on-chip as far as I remember) what came after (with similar AMD/IBM/ARM tech) was quite controversial as far as I remember. I think it was SGX 1 vs 2 or maybe Intel-TE that was marked tamper resistant, because everything happened on die, but I could misremember.
On the other hand: Reddit thread about SGX from 5 years ago. I think the talking point even back then was "state actors in our data center are not a concern".