Conversation

TPM compare very poorly to the modern secure elements heavily used by Pixels and Apple devices. API is very flawed and lacks a lot of capabilities. Common approach of wiping data on firmware upgrade instead of a proper insider attack resistance API like AOSP is also quite awful.
1
2
Secure elements aren't just heavily used by the OS but also by lots of apps via the hardware keystore APIs available to every sandboxed app. developer.android.com/training/artic is the stripped down newer version of this for secure elements as opposed to the traditional TEE (TrustZone) one.
Among other things, they can be used as FIDO2 security keys including secure physical confirmation and optionally requiring that the user profile is unlocked. The hardware attestation support is also drastically nicer and more usable. It doesn't break on upgrades for one thing.
1
2