this post was submitted on 13 Dec 2024
211 points (97.7% liked)

PC Gaming

8770 readers
365 users here now

For PC gaming news and discussion. PCGamingWiki

Rules:

  1. Be Respectful.
  2. No Spam or Porn.
  3. No Advertising.
  4. No Memes.
  5. No Tech Support.
  6. No questions about buying/building computers.
  7. No game suggestions, friend requests, surveys, or begging.
  8. No Let's Plays, streams, highlight reels/montages, random videos or shorts.
  9. No off-topic posts/comments, within reason.
  10. Use the original source, no clickbait titles, no duplicates. (Submissions should be from the original source if possible, unless from paywalled or non-english sources. If the title is clickbait or lacks context you may lightly edit the title.)

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 18 points 1 week ago (1 children)

It's a way of tying an encryption key to the processor. Depending on how you look at it that's either a good way to ensure your disks aren't readable if they're separated from your machine or a vendor lock-in.

[–] [email protected] 6 points 1 week ago (1 children)

Man, I recently ran into this shit when I bought a computer for my patents. I wanted to upgrade their hard drive and the fucking thing wouldn't boot unless I fully cloned the original hard drive into the new one.

I never even knew about this fuckery

[–] [email protected] 4 points 1 week ago

It certainly can be a pain in the proverbials. It's one of those things that can be good or bad. When it's the end user deliberately choosing to use it, it can provide extra peace of mind and lock down certain attack vectors, when it's the vendor doing it, it's just a way to make it harder to service your machine. That it also still locks down certain attack vectors is almost a byproduct in that scenario.