Yes it is, if your threat model excludes physical access; and in that case, it's probably more secure than anything software can do.
Yes it is, if your threat model excludes physical access; and in that case, it's probably more secure than anything software can do.