So the title is that it provides zero practical security, then the article goes on to talk mostly about 1 hypothetically less secure feature... Followed by several practical security use cases for TPM? Virtual smart cards, Window hello..... You know certificate private key protections where the user facing impact exists?
What a stupid sensationalist title.
How about something more accurate: TPM provides plenty of excellent security features that, when leveraged properly, provide great additional security, but still isn't foolproof.