Yes, Backhole entry into a secure network, But
TC is about protected participants, not related to a network security, at least not yet. In other words, Trusted Components (PCs, Servers etc..) should theoretically operate without security threat over a totally unsecure network.
Well, it is true, that one can implement TC in network components, creating a Trusted Network environment, but that is a possible future, and not a requirement for TC to take place in a totally, I mean totally unsecure network.
That is where I think the strength is, and that is why I believe that the abbandoned concept, is becoming the industry focus now. Will it prevail, we shal see.
My bet is that it will.