Reason I’m asking is because there are some people claiming that the TPM is a backdoor or something. I wonder if people on Lemmy subscribe to that belief, or no?
Reason I’m asking is because there are some people claiming that the TPM is a backdoor or something. I wonder if people on Lemmy subscribe to that belief, or no?
I don’t use either of those. If I were to use anything I’d use Linux’s LUKS disk encryption, but as others have said, I’d rather error on the side of data recovery if I lose the keys.