... routine where you set the root of trust, tamper evidence, law, and physical control. For example, ...
... that computers not be designed for remote control by corporations or governments. Owners ...