In part 3, let’s take a look at ways to utilize Trusted Execution Environments.