It only takes one guy to copy it and upload it to bittorrent or something. All these trusted computing schemes are dependent on the weakest link never breaking, where the weakest link is a piece of hardware that the attacker always has access to.