key generation: paranoia mode - explicit random input
Hauke Laging
mailinglisten at hauke-laging.de
Mon Mar 3 04:16:44 CET 2014
Am Sa 01.03.2014, 08:40:56 schrieb Daniel Kahn Gillmor:
> Asking the end users to routinely choose a novel high-entropy seed for
> randomness *without* relying on OS-level feature like /dev/random or
> /dev/urandom seems even worse than the case you're trying to defend
> against.
Probably. But this is not a proposal for "users" but for the kind of
people who regularly write on this list. People who know what they are
doing.
Security improvements never(?) come for free.
Hauke
--
Crypto für alle: http://www.openpgp-schulungen.de/fuer/unterstuetzer/
http://userbase.kde.org/Concepts/OpenPGP_Help_Spread
OpenPGP: 7D82 FB9F D25A 2CE4 5241 6C37 BF4B 8EEF 1A57 1DF5
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 490 bytes
Desc: This is a digitally signed message part.
URL: </pipermail/attachments/20140303/8567dfb6/attachment.sig>
More information about the Gnupg-users
mailing list