... model, wherein the first person to use the machine gets to initialize its root of trust. ...
... their machine's root of trust, they punch holes in the network perimeter by accident, ...