... But there's another TPM threat model. It's that a piece of malicious software infects ...
... program would actually have to devise an offer where where I am was actually a piece of using ...