The bits about "preventing theft" and "user security" are secondary justifications. It's the same basic pattern as all authoritarianism - the main goal is the control itself, which then provides trickle-down stability.
I'll be interested in trusted hardware when I see an implementation that actually puts the device owner into the privileged position, rather than reserving it for the device manufacturer.
But they can’t.
Because it’s not about giving you control, but about controlling you.