Access control in the real worldWe still should consider about security architecture and bugs even if there are secure isolation.Security Architecture NotionTEEDot-Dot AttackTrust ArchitectureCode IntegrityCode Injection attackSoftware Sandboxing