... their machine's root of trust, they punch holes in the network perimeter by accident, ...
... routine where you set the root of trust, tamper evidence, law, and physical control. For example, ...