1232 entries in 0.974s
assbot: Proof That Mycelium Knows How To Make A Better
RNG For Its Entropy Dongle. And Isn't. | Contravex: A blog by Pete Dushenski
BingoBoingo: mircea_popescu: I'm moe dumfounded that he didn't just fck the
rng to favor him
BingoBoingo: God is actually just the old Debian
RNG flaw, n always ===== 6
BingoBoingo: do you read this thing like i do, ie, a nsa-sponsored attempt to survive the "everyone has cardano
rng on board" apocalypse by making good entropy sources still circumventable ? << I read either that or some kernel afficianado who would buy a unix pacemaker
mircea_popescu: sciilifeform do you read this thing like i do, ie, a nsa-sponsored attempt to survive the "everyone has cardano
rng on board" apocalypse by making good entropy sources still circumventable ?
mircea_popescu: all these people derping about "quantum-computing-strong hashes" and whatnot are starting to get on my motherfucking nerves. yo idiots! are you aware that every
rng out there actually uses some sort of quantum noise ? WHAT THE FUCK ARE HASHES GOING TO DO WHEN I KNOW ALL THE SEEDS!
decimation: I was echoing ascii's distinction between prng and
rng mircea_popescu: the idea was that you can replace the platform's
rng, in extremis, by rolling dice.
benkay: hee hee hee i got the
rng flamewards going again
decimation: re: rolling dice to generate RSA keypair << this is not straightforward at all, and in general you are going to end up seeding some kind of
RNG to produce your primes to test
Rassah: benkay: this is what one calls a "strawman" argument. // actually this is what is being suggested that people do to create secure paper wallets. I am suggesting that ours is comparable. At the least because people who use that method don't check the RNGs of the systems they use, and at the most because we don't actually use an
RNG chip, and use our own source of randomness.
BingoBoingo: mircea_popescu: Well, it was born knowing it would be the
RNG. The problem is do the devs make shims or does Linuxen fix itself
benkay: <Rassah> so tech knowledge enough to be able to check how the software works, and maybe hardware knowledge to know what chips are being used in the schematic // well if its chips and an
rng, asciilifeform's likely to tell you that unless you can inspect the chips (which you can't), you can't make claims about the
RNG.
Rassah: options are. So, yeah, it's not perfect (with
RNG nothing ever is). But it'll help
Rassah: It may reduce entropy, but it inreases he number of attack vectors, doesn't it? Attacker would need both the hardware based
RNG and the salt to compromise it
Rassah: So, we won't be relying on Atmel's
RNG, and will be reading their SRAM directly
benkay: asciilifeform, mircea_popescu: where's the post detailing cardano
rng construction?
GinAddict1: old on purpose or by chance? i.e. worried about some
RNG in recent chips?=
jurov: the
rng is hidden on the chip
punkman: mike_c: my
rng is really bad
mircea_popescu: pankkake: it's not necessarily weaker << it's in fact weak to very bad
rng. it has in displayed this in the wild, on some machines for which
rng = 9
TheNewDeal: I thought MPEX's NSA was developing some
RNG decimation: the next problem: they have an auditable
RNG, but how do you know they are actually using it?
joecool: asciilifeform: i don't generate keys on card for the
rng issue, need to upload from laptop, but yeah sure no way to enter pin outside the laptop
punkman: there's also a bunch of GPIO pins, could hook up an
RNG or a geiger counter
jurov: lol andreas schildbach is just leaking "Mycelium Entropy"
rng for printing paper wallets
mod6: ye ole behind-the-curtain
rng jurov: in any case there's
rng on STM chip used for ecdsa
Naphex: its pretty basic to just use a custom
RNG then Math.random in js
BingoBoingo: Lemme guess this is also the android
RNG problem
danielpbarron: don't you also need cryptographically secure
RNG to do the signing?
Naphex: you can if you want use the
rng to generate a priv key, but you can just as well upload one
danielpbarron: i assumed that a built-in
RNG on the card meant that the key was generated on the card
Naphex: so you can use whatever
rng and store/transmit it securely
Naphex: anyway regarding smart cards and
rng, for bitcoin is not that much worry-some cause you can just store your private key on it and use that to sign the transactions
GAit: i specified the attaccks or problems.
RNG is one
mircea_popescu: (incidentally, the
rng of the java thing is particularly atrocious. piuk (blockchaininfo) made some fixes on a fork)
fluffypony: robwhiz22: the
rng project is basically based on buttcoin:sharpie density
robwhiz22: mircea_popescu, are you working on an
RNG project? Do you have a link?
robwhiz22: BingoBoingo, I didn't critique it. I don't know anything about any
RNG project. I was just answering mircea_popescu's question, in which he quoted "and conversely objects which pass randomness tests must have high algorithmic complexity" and hten said "not familiar with the 'complex objects' in question.".
danielpbarron: from what I understand, a lot of the cardano research is getting the right hardware
RNG; is trezor up to the same standard?
mircea_popescu: why's you lot so worried about teh cardano anyway ? it's just a strong crypto device with impenetrable
rng, what of it ?
bounce proposes to include robwhiz22 in the premium version of the
rng. such noise!
artifexd: I've learned that the raspberry pi has a hardware
rng. My current plan is to build use that. I'll Von Neumann it if necessary. Regardless, as soon as I get one, I'll use the tools asciilifeform recommended to measure the entropy.