... But there's another TPM threat model. It's that a piece of malicious software infects ...
... They just take a ton of computers and some software. ...