trusted computing base examples