The Picard Maneuver@lemmy.world to People Twitter@sh.itjust.works · 10 days agoIs that bad?lemmy.worldimagemessage-square214linkfedilinkarrow-up110arrow-down10cross-posted to: programmer_humor@programming.dev
arrow-up110arrow-down1imageIs that bad?lemmy.worldThe Picard Maneuver@lemmy.world to People Twitter@sh.itjust.works · 10 days agomessage-square214linkfedilinkcross-posted to: programmer_humor@programming.dev
minus-squareSparroHawc@lemm.eelinkfedilinkarrow-up0·10 days agoThe main difference is that it requires TPM 2.0, which allows applications to run in a fully encrypted mode and prevent user tampering.
minus-squareSharkAttak@kbin.melroy.orglinkfedilinkarrow-up0·8 days agoOh no! Not the user tampering! 😱
minus-squareSparroHawc@lemm.eelinkfedilinkarrow-up1·4 days agoOstensibly it’s to protect things like credit card information. In reality it’s to make sure Microsoft has more control over your computer than you do.
The main difference is that it requires TPM 2.0, which allows applications to run in a fully encrypted mode and prevent user tampering.
Oh no! Not the user tampering! 😱
Ostensibly it’s to protect things like credit card information. In reality it’s to make sure Microsoft has more control over your computer than you do.