There are certainly useful uses for trusted computing, like discouraging tampering with distributed computing projects, but they are used much more often to implement DRM and restrict hardware. They don't it to be impossible, just hard enough that the average user gives up.
Currently it is possible for an average user to to install Linux, but if that process requires hardware tampering (no normal person will decap chips), almost no one will do it.
WAKE UP AND... SMELL THE ASHES