... model, wherein the first person to use the machine gets to initialize its root of trust. ...
... routine where you set the root of trust, tamper evidence, law, and physical control. For example, ...