... rapidly goes downhill from there. I sincerely hope no-one blindly follows the given advice without giving more than a moment's thought to the implications.
Then again I suppose it is the sort of thing you would expect a SoC maker to say. How did the paper conclude before marketing got their hands on it? Presumably not by suggesting you trust your secret keys to our magical silicon and lock down the debugging interface to make third party auditing that bit more difficult. That's just the sort of thing you would do to if you want to put a bit of space between yourself and those that want to rip off your software.
Hardware support for virtualisation the 'gold-standard' indeed.. And how exactly would these disparate OS images share their data without opening up the exact same attack surfaces?