Avatar

chickentendrils

chickentendrils@lemmy.ml
Joined
0 posts • 10 comments
Direct message

The noise coming from an open microphone has enough entropy for what we’d usually assume to be random.

It is possible to hit a bottleneck getting random numbers, but there’s /dev/urandom which shouldn’t block it’ll just keep outputting without enough entropy to guarantee pseudorandomness.

Usually you’ll know if you’re hitting one of those bottlenecks, probably it’ll only come up in production or hopefully in load testing.

permalink
report
parent
reply

Yeah as long as the setup for the device symlinked its device path to /dev/random or you did that yourself. Stuff I used had a Java SDK

permalink
report
parent
reply

Yeah, not USB but in principle it’s the same whether it’s PCI or whatever. There’s no way to prove an RNG is truly random really just have to rely on validating subsets of its output look random. NIST has published recommendations for sampling RNGs.

Here’s the title:

A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications

I don’t think there’s a real need unless it’s regulated to need some dedicated HW RNG.

permalink
report
reply

That sucks. Do you have a hitchhiker’s thumb at all? (Slight or even 90 deg bend in thumb)

Here’s hoping I got the hand joint genes from the side of my family that lived to be 95-96 and were still building barns, and not the side that had gout and died in their 60s.

permalink
report
reply

A real danger? no. A “danger” that can be taken advantage of to justify more weapons contracts, police & surveillance technology transfers, and maybe an intervention a couple decades from now in UA after some stuff explodes up and it’s pinned on Azov? If they can still conduct themselves that way, surely they will.

permalink
report
reply

I posted on here that Zelensky or his likely Azov-aligned successor would get the saddam treatment in the future. It was after that Italian occult neonazi bust with all the redirected arms from Ukraine.

permalink
report
reply

The attacker can just be smarter and use various ASNs + out-proxies for their backend.

My background is small-world network in distributed systems and anti-censorship software like Hyphanet. If the goal is to evict/lessen the purview of the metadata harvesting nodes then some version of web-of-trust + proof of work could be implemented.

permalink
report
parent
reply

I got the most LIB text ever on E Day

permalink
report
reply