https://9dok.net/document/yj75m9m2-using-trusted-execution-environments-factor-authentication-comparing-approaches.html