... and the one in which users may be able to control their computers some of the time. ...
... routine where you set the root of trust, tamper evidence, law, and physical control. For example, ...