Without secure hardware, there is no secure software.