using alternate sources of entropy

Peter Todd pete at
Fri May 10 23:49:14 CEST 2013

On Fri, May 10, 2013 at 09:28:55AM +0200, Werner Koch wrote:
> On Tue,  7 May 2013 21:24, pete at said:
> > If you add the accelerometer data to /dev/random yourself and keep track
> > of how many bits of randomness you've added the hack could be to just
> You are not able to track this because you can't have an estimation on
> many bytes other processes are reading from /dev/{u,}random.

I'm assuming that provided a sufficient number of bits whose values are
unknown to any adversary are added to the pool all subsequent
/dev/urandom output is suitable for use as key material.

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 198 bytes
Desc: Digital signature
URL: </pipermail/attachments/20130510/50cb02d5/attachment.sig>

More information about the Gnupg-devel mailing list