> How does the system know whether the new bootloader is legitimate or not?
However it wants to. Maybe the existing bootloader (chosen by the owner rather than the vendor) or the OS it loads has its own signature verification system for update packages, like apt-get. Maybe the OS downloads it from a trusted URL via HTTPS and relies on web PKI. Maybe it uses Kerberos authentication to get it from the organization's own update servers. Maybe it just boots an OS that allows the operator to apply any update they want from a USB stick, but only after authenticating with the OS.
None of that is the firmware's problem, all it has to do is disallow modifications to itself unless the owner has entered the firmware password or the system is booted from the owner-designated trusted bootloader.
> All TPMs have private keys from the factory. They're entirely unrelated to the secure boot keys.
The point isn't which device has the keys, it's that it shouldn't contain any from the factory. Nothing good can come of it.