Yeah as long as the setup for the device symlinked its device path to /dev/random
or you did that yourself. Stuff I used had a Java SDK
Yeah as long as the setup for the device symlinked its device path to /dev/random
or you did that yourself. Stuff I used had a Java SDK
Yeah, not USB but in principle it’s the same whether it’s PCI or whatever. There’s no way to prove an RNG is truly random really just have to rely on validating subsets of its output look random. NIST has published recommendations for sampling RNGs.
Here’s the title:
A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
I don’t think there’s a real need unless it’s regulated to need some dedicated HW RNG.
That sucks. Do you have a hitchhiker’s thumb at all? (Slight or even 90 deg bend in thumb)
Here’s hoping I got the hand joint genes from the side of my family that lived to be 95-96 and were still building barns, and not the side that had gout and died in their 60s.
Mozz doesn’t phase me. There’s dairy that would wreck me but that one never did.
Alright just admit to rational fascism
A real danger? no. A “danger” that can be taken advantage of to justify more weapons contracts, police & surveillance technology transfers, and maybe an intervention a couple decades from now in UA after some stuff explodes up and it’s pinned on Azov? If they can still conduct themselves that way, surely they will.
Pre-SMO but there were these weapons neonazis who went to UA brought back to Italy: https://www.reuters.com/article/world/italy-seizes-air-to-air-missile-guns-in-raids-on-neo-nazis-idUSKCN1UA1SZ/
This one busted in 2022 also linked to Azov and such:
https://www.vice.com/en/article/italy-neo-nazis-order-of-hagal/
I posted on here that Zelensky or his likely Azov-aligned successor would get the saddam treatment in the future. It was after that Italian occult neonazi bust with all the redirected arms from Ukraine.
The attacker can just be smarter and use various ASNs + out-proxies for their backend.
My background is small-world network in distributed systems and anti-censorship software like Hyphanet. If the goal is to evict/lessen the purview of the metadata harvesting nodes then some version of web-of-trust + proof of work could be implemented.
I got the most LIB text ever on E Day
The noise coming from an open microphone has enough entropy for what we’d usually assume to be random.
It is possible to hit a bottleneck getting random numbers, but there’s /dev/urandom which shouldn’t block it’ll just keep outputting without enough entropy to guarantee pseudorandomness.
Usually you’ll know if you’re hitting one of those bottlenecks, probably it’ll only come up in production or hopefully in load testing.