Close it, no. But have you carefully examined "Trusted Computing". The idea is to enforce key based hardware authentication and data access in the boot loader that loads the operating system, the kernel itself, the applications, the system files, and in attached media. It's presented as a security stack, but the implementation is aimed at DRM at every level of the software stack. And the private keys are held in escrow, mostly by Microsoft, with retains the root keys to sign new keys or to revoke old others, so the system can be used to allow "authorized" access for others or to revoke your own access to your own data.
The system is quite dangerous if you fear that the central escrow holding user's private keys will be handed over to abusive governments, or revoked to block access to personal data. I'm afraid I've seen no technical or political reason yet to assume that it will _not_ be abused.