Protecting against TPM interposer attacks | Dark Hacker News