McDonalds!
The issue client-side is that if a single vendor or TPM design is compromised, threat actors have ample motive, resources and ability to exploit this compromised hardware, whilst everyone else has few choices, such as dumping at great expensve some more e-waste. And critically, you as a user are blocked by your acceptance of TPM attestation technology from discovering attacks and auditing your own system security, as you ceded control of your own systems. Instead, your systems are controlled by a few technology companies that have a proven terrible track record of fulfilling their alleged intent of keeping your systems and data secure. And why should they care if it doesn't lead to a higher profit at the end of the year?
[1] https://github.com/binarly-io/SupplyChainAttacks/blob/main/M...
[2] https://github.com/binarly-io/SupplyChainAttacks/blob/main/M...
[3] https://github.com/binarly-io/SupplyChainAttacks/blob/main/L...
[4] >>30565985
It happens one step at a time:
https://gabrielsieben.tech/2022/07/29/remote-assertion-is-co...