• @[email protected]
    link
    fedilink
    42 months ago

    The main difference is that it requires TPM 2.0, which allows applications to run in a fully encrypted mode and prevent user tampering.