jimbean802
Member
- Local time
- 10:33 AM
- Posts
- 1
- OS
- 11
Where and when are cryptographic algorithms used (During Boot , Playing games, typing, Internet
All of them ?
I`m trying to understand the need for TPM 2.0
It`s another one of those thing`s that everybody say`s you have and got to have (Like the King's new clothes story, the Dressmaker say's you have clothes king, but alot of people did not see anything)
And the other one where your computers multitasks (for 1 year then slows down because to many things are locking it up after a year) as long as you don't install more than anything more than the operating system with no driver`s
sorry don't mean any disrespect to anybody i am not being a smarta**.
but ive been playing with computer's since a 386sx 25mhz.
And they have always left me with a loss of everything :)
Explanation for TPM 2.0 for the working man ? other than it's more secure
I've read that it is more unsecure
All of them ?
I`m trying to understand the need for TPM 2.0
It`s another one of those thing`s that everybody say`s you have and got to have (Like the King's new clothes story, the Dressmaker say's you have clothes king, but alot of people did not see anything)
And the other one where your computers multitasks (for 1 year then slows down because to many things are locking it up after a year) as long as you don't install more than anything more than the operating system with no driver`s
sorry don't mean any disrespect to anybody i am not being a smarta**.
but ive been playing with computer's since a 386sx 25mhz.
And they have always left me with a loss of everything :)
Explanation for TPM 2.0 for the working man ? other than it's more secure
I've read that it is more unsecure
My Computer
System One
-
- OS
- 11