• @[email protected]
    link
    fedilink
    English
    04 months ago

    It is based on the assumption that every piece of code in the entire stack from the UEFI firmware to the operating system userspace is free of vulnerabilities

    • @[email protected]
      link
      fedilink
      English
      24 months ago

      That doesn’t mean it’s useless. All software is prone to vulnerabilities and exploits, but that doesn’t mean its not worth using it at all. TrueCrypt was a good solution for the time, even if we now know it is pretty vulnerable