This sets up the ability to identify and incapacitate anyone
It's always important to safeguard your identity and personal information on any device you use. However, claiming TPM serves to "identify and incapacitate" your device is wildly inaccurate. As I explained in my other comment, TPM exists for cryptography. It has nothing to do with what you're claiming.
It's always important to safeguard your identity and personal information on any device you use. However, claiming TPM serves to "identify and incapacitate" your device is wildly inaccurate. As I explained in my other comment, TPM exists for cryptography. It has nothing to do with what you're claiming.
So, you see that it stores keys for cryptography, but you don't see how said keys can be used to identify you.
You also don't seem to understand the implications of having this kind of cryptographic system that you're not in control of.