They’re two sides of the same coin. Can’t have privacy without security and can’t have security without privacy.
Hmmm… I half agree with what you said. The corner stone of most security is an element of initial trust.
With SSL, we’re trusting that the certificate authority is valid.
With tools like GPG, I (as the sender) are trusting that the key I’m using to sign a message is really yours.
With Android we (the users) and the application developers are trusting Google (hence why “sideloading” is now “bad”, because Google says it is).
I absolutely agree that privacy cannot exist without security. But, your privacy is dependent on who your security model trusts.
I don’t trust Google with my privacy (hence, I degoogle) , but my bank app doesn’t trust my security (hence, the app can only be installed via Google Play).
So, privacy is dependent on security, but security is built on trust.




That’s the strength of public/private key encryption.
The application (or OS) knows what the hardware vendors public key is. Thus ,it can verify that any message (or application key) claiming to come from that hardware (TPM) is legitimate or not. Thus, the OS is just a proxy or the middle man.
Now what you could do (in theory) is to start modifying the application and replace the hardware vendor public key with your own. …but you’d need to do this with every application and they’ll probably have some sort of anti-tampering or (more likely) you won’t even be allowed to install the application because your OS isn’t “safe/secure”.
disclaimer: I’m a bit hazy on some of these details. There are probably more elegant solutions.