User2288 You have misconceptions about Intel ME which were addressed in the thread.
ARM is dramatically simpler than x86, and Tensor is a particularly simple/clean smartphone SoC implementation. Nearly everything is dramatically simpler. There's no SMM, ACPI, UEFI or countless other things, not just ME. There's no equivalent to them because things are simpler done in a simpler way. Device management is done via apps in the OS granted device management permissions and that's more than good enough for the use case. Those apps can use hardware attestation if they want to verify the device / OS.
I suppose a base band attack that gains access? What kind of access could that entail? What does the "isolation" actually do?
This is venturing into similar misconceptions about cellular basebands. It's not different from Wi-Fi/Bluetooth. The isolation is the same: they can only access their own memory and system memory shared with them by the driver which along with the userspace services/libraries are responsible for safely interacting with the component and avoiding vulnerabilities exploitable through the communication. It's little different from any other radio or network card. They're typically not properly isolated in desktops, but they are properly isolated in the devices we support and bypasses for that isolation are considered High severity vulnerabilities similar to comparable privilege escalations within the OS.