• @[email protected]
    link
    fedilink
    429 days ago

    The main difference is that it requires TPM 2.0, which allows applications to run in a fully encrypted mode and prevent user tampering.