... routine where you set the root of trust, tamper evidence, law, and physical control. For example, ...
... their machine's root of trust, they punch holes in the network perimeter by accident, ...