The code executed during the trusted execution environment can not be viewed or modified, so an attacker would only manage to execute destructive code with full privileges on a similar processor. The CreateEncryptor process with the Aes class is handed The true secret and IV that are utilized for encryption. In this case, the default key and IV ge