Oddbean new post about | logout
 The use of TPM is controversial, they have managed to decrypt disks through the vulnerabilities of the same, and the TPM are like the secure element, in the article obviate this, hence many deny using it.

I prefer my encryption to depend on the strength of my password than to rely on a third party, this has been the Linux approach and should continue to be the case, from my point of view.