I think you're a bit far from the damned scope of running stuff with whatever like TPM man. The fact is that granted a damned local physical state with the servers does null and void any security you might have. The fucking integrity of initrd and kernel is of secondary value. There's TPM for Linux, and to tell you the truth the stuff is not realistic, what you say about integrity.
Look, if you get to the scope of unprotected init ram disk and kernel there's no amount to what you can't do. No amount of TPM or security through obscurity is going to protect you. Your whole argument that security is null and void is a bit questionable. Just pull a KNOPPIX disk and boot from it. Lacking encryption of the damned file systems, there's nothing that you can't do. Or do you know a way to somehow prevent the leakage of fiiles to the attacker?
Please argue inline since I'm not interested in reading some external site for a blog of some random yahoo.