• @[email protected]
    link
    fedilink
    English
    03 months ago

    It is based on the assumption that every piece of code in the entire stack from the UEFI firmware to the operating system userspace is free of vulnerabilities

    • @Emerald
      link
      English
      23 months ago

      That doesn’t mean it’s useless. All software is prone to vulnerabilities and exploits, but that doesn’t mean its not worth using it at all. TrueCrypt was a good solution for the time, even if we now know it is pretty vulnerable