@ubergeek the speaker covered this very briefly and I'm confident that it's not really true, but they are hard to use for more general usability issues than reasons of anti-user sentiment.
They absolutely _can_ be abused, but this isn't inherent to the tpm design but more like things such as tpm-using DRM or secureboot preventing loading a new os.