... First thing, we transform the big data into some model ...
... But there's another TPM threat model. It's that a piece of malicious software infects ...