Re: High requirements
does that stand for fsck TPM? who actually *trusts* it? what exactly makes it *trustworthy*? are all implementations actually to be *trusted*? is it another security feature waiting to be a new low level exploit vector to be abused?