I had hoped someone would link to this movie as it is one of my favorites. The description of trust that it provides, at least when referring to individuals, is beautiful.
TRUST | confidence
Trust is the personal believe in correctness of something. It is the deep conviction of truth and rightness and can not be enforced. If you gain someone's trust, you have established an interpersonal relationship, based on communication, shared values, and experiences. Trust always depends on mutuality.
However, the video perpetuates some of the misinformation surrounding the Trusted Platform Module and Trusted Computing. Please allow me to explain how it does so, and then I will share my viewpoint on the matter.
In the trusted computing environment, the major goal is to protect us from potential threats. The original trusted computing idea is designed to let you to decide what's to consider as threat and what's to consider as trustworthy. You can control by your own personal conviction. The industry's interpretation of the trusted computing idea looks quite similar, aiming at the same: to fight threats, and make computing trustworthy. The main difference is that you cannot decide by your own what is trustworthy and what is not, because they already decided for you, and they already decided not to trust you.
The primary stated objective of Trusted Computing has always been to protect "us" from potential threats.
Trusted Computing does not prohibit "us" (either implicitly or explicitly) from trusting other entities. In fact, there are several features that Trusted Computing enables which directly contradict the video's statement - Sealed Storage and Attestation are two of them, the former allows me to encrypt data to a specific configuration (Example: I don't trust other applications with my banking information, so I will Seal it so that only my banking application can access it), while the latter allows me to send information about my hardware and/or software configuration to external requestors, whom can then determine whether to trust my configuration based on this information.
For the record, implicit, or implied trust being defined as the use of software or hardware. (Example: I may not directly state that I trust this keyboard that I am using to type this message, but logic dictates that I trust it because I am using it). Explicit trust is formed on the basis of something, such as communication (Example: I've seen the information sent by Attestation, and I will allow this computer access because I trust that the information is not lying).
So if they don't trust you, why should you trust them?
This is actually one of the reasons that I love Microsoft's Bitlocker encryption - by treating the owner of the computer as a potential adversary, it shows no partiality. In order for me to trust the Trusted Platform Module, the Trusted Platform Module must trust no one.