key generation: paranoia mode - explicit random input
mailinglisten at hauke-laging.de
Mon Mar 3 04:16:44 CET 2014
Am Sa 01.03.2014, 08:40:56 schrieb Daniel Kahn Gillmor:
> Asking the end users to routinely choose a novel high-entropy seed for
> randomness *without* relying on OS-level feature like /dev/random or
> /dev/urandom seems even worse than the case you're trying to defend
Probably. But this is not a proposal for "users" but for the kind of
people who regularly write on this list. People who know what they are
Security improvements never(?) come for free.
Crypto für alle: http://www.openpgp-schulungen.de/fuer/unterstuetzer/
OpenPGP: 7D82 FB9F D25A 2CE4 5241 6C37 BF4B 8EEF 1A57 1DF5
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 490 bytes
Desc: This is a digitally signed message part.
More information about the Gnupg-users