Well, knee-jerk reactions to TPM are just embarrassing.
First, it's already very much possible to lock down the boot sequence. Just look at all these Motorolla phones with locked bootloaders. It's even possible to do it on x86-based CPUs.
Second, TPM does provide security benefits. For example, I can use it to store keys for full-disk encryption and keys will be released only if boot loader is secure. Argument that viruses are going to use exploitable bugs anyway can just as well be used against EVERYTHING, including Unix access rights and SELinux/AppArmor.
Third, bootloader attacks are very much real. There are worms out there that actively use bootkits.
Fourth, there are good uses even for remote attestation.