• @SparroHawc@lemm.ee
    link
    fedilink
    43 days ago

    The main difference is that it requires TPM 2.0, which allows applications to run in a fully encrypted mode and prevent user tampering.