• SparroHawc@lemm.ee
    link
    fedilink
    arrow-up
    0
    ·
    10 days ago

    The main difference is that it requires TPM 2.0, which allows applications to run in a fully encrypted mode and prevent user tampering.