I was just making the point that the military's network is vast and stretches multiple domains. For them to protect it, every point on the network needs to be secured.
TPMs are discussed in several of the papers. I'm sure they will be part of the military's strategy to help secure every PC (and I'm sure you are correct as well - TPMs will not be the ONLY technology used. The ones you listed will be used in some capacity as well.)
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.