... don't like it, find someone else's computer to use. This one's mine. I set the rules." ...
... to compromise your computer, and TPM tamper evidence lets you know when that's happened. ...