"However, if the computing device is a peripheral device, such as a printer, there may be no easy way to enter an encryption key (or other configuration information) into the computing device." . . . .