It's trusted in the sense that it lets the person with power (the root of trust) trust the hardware.
That person just isn't you.
It's a way to enforce power relations by making the hardware respect them. From this perspective, it's pretty evident how it degrades adversarial interoperability, which is about ignoring power relations to build your own system.