> There are a lot of advantages to assuming the hardware is mildly trustworthy. The downside is you may not want Microsoft to be controlling what counts as trusted on your machine.
In an IT security context, "trusted" (example: "trusted computing") means distrusting the users.
In an IT security context, "trusted" (example: "trusted computing") means distrusting the users.