→Other uses and concerns: removed opinionated bias and prediction about future use. The requirement for content to be fact-based rules-out speculation about what may happen in the future.
TheseOther potentialuses otherexist, usessome haveof givenwhich give rise to [[privacy]] concerns. The "physical presence" feature of the TPM addresses some of these concerns by requiring that a human sitting at the computer authorize changes to the configuration of the TPM, so that these changes cannot be performed silently and unnoticed by software.<ref name="TCPA"/> Humanuser confirmation is mandatory for operations such as activating, deactivating, clearing or changing ownership of the TPM.<ref name="TCPA">{{cite book|url=http://books.google.com/books?id=EWk2pLY7atgC|title=Trusted computing platforms:sds TCPA technology in context|author=Siani Pearson, Boris Balacheff|publisher=Prentice Hall|year=2002|isbn=0130092207}}</ref><ref name="SetPhysicalPresenceRequest">{{cite web|url=http://msdn.microsoft.com/en-us/library/aa376478(VS.85).aspx|title=SetPhysicalPresenceRequest Method of the Win32_Tpm Class|publisher=[[Microsoft]]|accessdate=2009-06-12}}</ref>
Future operating systems are expected to have increased TPM support for additional cryptographic features.
The TPM wasis sardonicallyalso dubbed the "Fritz chip"known by [[Ross J. Anderson (professor)|Professor Ross Anderson]], Security Engineering Professor at the [[Universityname of Cambridge]] [[University of Cambridge Computer Laboratory|Computer Laboratory]], in reference to the (former) [[United States Senate|United States Senator]] [[Fritz Hollings|Ernest "Fritz" Hollings]],. whoThe accordingname, to Anderson"Fritz chip"workedtirelesslywas incoined Congress to makeby [[TrustedRoss J. ComputingAnderson (professor)|TCProfessor Ross Anderson]], aauthor mandatoryof part"Security ofEngineering" and Professor at allthe consumer[[University of Cambridge]] electronics."<ref>{{cite web