--- this is comment, not an answer ---
http://www.intel.com/design/mobile/platform/downloads/Trusted_Platform_Module_White_Paper.pdf
BIOS Code
The TCPA specifies the measurement of integrity of BIOS code at system startup. In order to accomplish such integrity measurement and reporting, the system BIOS has to be enhanced with integrity measurement functions.
Depending on the existing BIOS architecture, such enhancements can be a complex task.
Platform vendors may wish to provide various pre-boot security functions using the TPM. The necessary code to provide such functions is either implemented directly within the system BIOS or provided as an option ROM.
Whether or not any pre-boot functionality is provided on the platform, minimum changes have to be made to the BIOS code to ensure that the TPM is defined as a motherboard device within the ACPI descriptor tables. This enables the Operating System to identify the device, allocate resources to it, and load necessary device drivers.
...
TPM implementation on Notebook PCs
Mechanical Requirements
The TPM has to be permanently attached to the motherboard by soldering it down. This reinforces the fact that the TPM provides a 1:1 binding between itself and the platform that it is attached to. Due to this requirement it is a good idea to factor in the real estate required for the TPM at an early stage in the motherboard design and layout process. The TCPA also recommends the provision of a tamper detection mechanism that can provide tamper evidence. An example of a tamper detection mechanism is the use of tamper tape
Would you check your laptop motherboard for signs of damage to tamperproof tape every day?