... But there's another TPM threat model. It's that a piece of malicious software infects ...
... any piece of information. We blink, we can recognize any object, recognize any person, ...