... But there's another TPM threat model. It's that a piece of malicious software infects ...
... a TPM threat model that crooks or governments or police forces or some other adversary try ...