Agreed. The comparison which wasn't clear in that sentence was to file-level encryption.
At the point of seizure, your chosen data protection method is either helping your adversaries by offering all files unimpeded, or helping you by not doing so.
It's equivalent to having no data protection at all, if you adversaries are competent.
At the point of seizure, your chosen data protection method is either helping your adversaries by offering all files unimpeded, or helping you by not doing so.
It's equivalent to having no data protection at all, if you adversaries are competent.