• Bitrot@lemmy.sdf.org
    link
    fedilink
    English
    arrow-up
    11
    ·
    10 months ago

    That is the tradeoff if one desires TPM-backed encryption. It really depends on the threat model.