Very good article 
-
-
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
Perhaps CONFIG_RANDOM_TRUST_CPU deserves a shout-out among this mess? https://lwn.net/Articles/760121/ …
-
Using it also means no blocking at boot!
- Još 1 odgovor
Novi razgovor -
-
-
This reminds me of certain company owner who didn't want his disk defrag tool to defrag encrypted files because this increases entropy and makes Xenu unhappy.
-
praise discordia!
Kraj razgovora
Novi razgovor -
-
-
The so-called "simulated" events within a VM are also, underneath, real events. And it can be fed entropy by a 'bare metal' domain in any case. Rest of the article's reasoning is similarly wobbly. CPU entropy black boxes are problematic.
-
Existing RNG... 1. Treats entropy as finite. Yes, this is a real thing in physics & no cultish misappropriation. 2. Works in software, such that anything skewing the RNG algorithm should also impact many other mundane processes (i.e. skew could not be ignored).
- Još 3 druga odgovora
Novi razgovor -
-
-
I was always skeptical of the theories behind counting entropy. It’s been a while since I dug into the internals of the generator in
#illumos. I’m inspired to have another look. -
MS has a fairly detailed paper on what they're doing in Win10 https://www.microsoft.com/security/blog/2019/11/25/going-in-depth-on-the-windows-10-random-number-generation-infrastructure … which I thought was interesting.
- Još 3 druga odgovora
Novi razgovor -
-
-
A quite ignorant take. On some hardware rdrand is broken. Linux 5.3 did not change getentropy as described. It is not just cryptography programs that ask the kernel for random numbers. Granted there are usability problems with the historical interfaces.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.