... model, wherein the first person to use the machine gets to initialize its root of trust. ...
... and shouldn't be trusted to set policy on the computers that they use. Now, as a former ...