... there is no approval process to build a hardware accessory or write the software that goes ...
... But there's another TPM threat model. It's that a piece of malicious software infects ...