... routine where you set the root of trust, tamper evidence, law, and physical control. For example, ...
... and distributed them to their customers. They stealthily installed malware. The root kit ...