... once verified, can check the signatures on the programs that run on it. And so on and ...
... and that any programs running in secret have gotten there by leveraging a defect in the ...