... routinely insert their own intermediate keys into their employees' devices-- their phones, ...
... evident. If you try to extract the keys from a TPM, it's supposed to be really obvious ...