You know, Lenovo says the same about the Thinkpad, yet there are people re-soldering the TPMs... before that you could simply replace, read or re-program a little eeprom. The general public should know now there is a difference with what can be done vs. what can be done.
The point you are missing is that the laptop must be usable in it's freshly stolen form for software tracking to be of any use - or else why would someone leave it powered on.
And often the person who steals the laptop doesn't hold onto it... they flip it... often as a laptop they "forgot the password to, just go to a computer shop to have it reset"
Once a computer store came to me to reset a BIOS password on a laptop for one of their customers. I reset the password and noticed the windows installation was configured to join to a domain... so I reset the local account, recovered the outlook PST file and called the former user of the laptop. It was a corporate laptop that was stolen from his garage a week prior. The police came to my work and I was summoned to show up in court as a witness to a stupid possession of stolen property charge in another city. I had to take time off for it and everything.
That said, the "useless security" was enough to get the laptop to the point where a number of people who had the technical ability to do the right thing could...
Mind you, it was an inconvenience to me to do so.
Leveraging always beats prototyping.