• SparroHawc@lemm.ee
    link
    fedilink
    arrow-up
    4
    ·
    1 month ago

    The main difference is that it requires TPM 2.0, which allows applications to run in a fully encrypted mode and prevent user tampering.