I think the latter. You can get plane parts for free these days (or so I was told).I believe that your salaries there have either increased significantly, or Boeings have become much cheaper...
I think the latter. You can get plane parts for free these days (or so I was told).I believe that your salaries there have either increased significantly, or Boeings have become much cheaper...
It can work on FreeBSD, just using FTDI USB chip. And freeBSD can support pyftdiDoes it work on FreeBSD? If not, why are you posting here?
Keyboard and mouse interrupt data is part of the Linux /dev/random entropy generation.Decades ago, Byte magazine had an article on building a noise generator that fed into a computer for giving a random number. Someone can search for that. Probably before 2000 but not sure.
Another article I read where the time it took between keypresses for someone on the keyboard
alias -x anuentropy="curl -k 'https://qrng.anu.edu.au/API/jsonI.php?length=1024&type=hex16&size=4' 2>/dev/null"
the freebsd entropy generation uses Schneier's Fortuna.
That's what I'd do! Cloudflare's implementation is cool: https://www.cloudflare.com/learning/ssl/lava-lamp-encryption/I used once some very old web camera for this. It was very bad camera - a lot of noise. Just capture raw image, concatenate with timestamp (higher resolution as possible), hash it, and use it as the key to encrypt something (/dev/zero or /dev/urandom output for instance), but not more than 4MB - then repeat.
If CPU is relatively good, there is /dev/hwrng as well.
bob2112 I sincerely hope that all the foolish villains of this world accept your advice without verification and completely uncritically.
I congratulate you on this low-quality contribution.
You could now allow yourself to revise your claim that hardware RNGs are “snake oil.”point to the flaw in FreeBSD's entropy management
What if you add analog circuitry? I don't think it's possible to somehow map a device and predict a variating binary number from a digital voltmeter between 2 points. Quite sure that's 0 success rate.You could now allow yourself to revise your claim that hardware RNGs are “snake oil.”
You could come to the realization that tapping entropy from a few hardware components is only a limited workaround. Some systems simply do not have a mouse, keyboard, or rotating hard drive, which means that the entropy is of such low quality that it does not meet the requirements for sufficiently secure encryption.
There are ways to degrade the quality of encryption to such an extent that it can be cracked with relatively little effort, namely by manipulating software-generated entropy.