Reason I’m asking is because there are some people claiming that the TPM is a backdoor or something. I wonder if people on Lemmy subscribe to that belief, or no?

  • BootLoop@sh.itjust.works
    link
    fedilink
    arrow-up
    0
    ·
    11 hours ago

    I don’t use either of those. If I were to use anything I’d use Linux’s LUKS disk encryption, but as others have said, I’d rather error on the side of data recovery if I lose the keys.