... the beginning of the threat must be found in order to empty the could croon ...
... But there's another TPM threat model. It's that a piece of malicious software infects ...