These seem like really good mitigations to make a userland RNG safe. But makes me wonder why they don’t just use a kernel RNG.https://aws.amazon.com/blogs/opensource/better-random-number-generation-for-openssl-libc-and-linux-mainline/ …
I'm curious what you think of this ... it's from SP800-90C and seems to defy the point of mixing in entropy and to allow a "Live Full Entropy Source" to bias/control the output with bit-for-bit effort. Seems odd to me.pic.twitter.com/PAmddbRLzV
-
-
This looks like what Linux was going to do with the mixing of RDRAND and PRG output. Or are doing. Doesn’t make much sense.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.