if it requires several intimate hours with the physical device the only scenario this would work if the device is stolen. the goal of good attack is to come and go unseen or unnoticed. this is not an issue with small scale facilities with zero to no security but not possible at the other end of the scale. these hack methods are realistic like you growing wings to fly after a can of red bull.. . . maybe? I haven't read up on the exploit enough to know exactly how it works, but it was stated that it takes ~$200 worth of hardware and several hours of access to the hardware to crack the TPM.