... from this threat. >> PHILLIPS: Great. Okay. Well, that concludes ...
... But there's another TPM threat model. It's that a piece of malicious software infects ...