It is based on the assumption that every piece of code in the entire stack from the UEFI firmware to the operating system userspace is free of vulnerabilities
That doesn’t mean it’s useless. All software is prone to vulnerabilities and exploits, but that doesn’t mean its not worth using it at all. TrueCrypt was a good solution for the time, even if we now know it is pretty vulnerable
It is based on the assumption that every piece of code in the entire stack from the UEFI firmware to the operating system userspace is free of vulnerabilities
That doesn’t mean it’s useless. All software is prone to vulnerabilities and exploits, but that doesn’t mean its not worth using it at all. TrueCrypt was a good solution for the time, even if we now know it is pretty vulnerable