The Picard Maneuver@lemmy.world to People Twitter@sh.itjust.works · 1 month agoIs that bad?lemmy.worldimagemessage-square315linkfedilinkarrow-up11.37Karrow-down111cross-posted to: programmer_humor@programming.dev
arrow-up11.36Karrow-down1imageIs that bad?lemmy.worldThe Picard Maneuver@lemmy.world to People Twitter@sh.itjust.works · 1 month agomessage-square315linkfedilinkcross-posted to: programmer_humor@programming.dev
minus-squareSparroHawc@lemm.eelinkfedilinkarrow-up4·1 month agoThe main difference is that it requires TPM 2.0, which allows applications to run in a fully encrypted mode and prevent user tampering.
minus-squareSharkAttak@kbin.melroy.orglinkfedilinkarrow-up1·1 month agoOh no! Not the user tampering! 😱
minus-squareSparroHawc@lemm.eelinkfedilinkarrow-up1·1 month agoOstensibly it’s to protect things like credit card information. In reality it’s to make sure Microsoft has more control over your computer than you do.
The main difference is that it requires TPM 2.0, which allows applications to run in a fully encrypted mode and prevent user tampering.
Oh no! Not the user tampering! 😱
Ostensibly it’s to protect things like credit card information. In reality it’s to make sure Microsoft has more control over your computer than you do.