On Tue, 19 Sept 2023 at 09:10, Guillermo Rodriguez Garcia <[email protected]> wrote: > > El martes, 19 de septiembre de 2023, Roberto A. Foglietta > <[email protected]> escribió: >> >> Guillermo confused the information with the entropy. >> > I didn’t confuse anything. Please leave me out of your arguments, thank you. >> >> Guillermo is getting mad and screaming >> > > :-? > You definitely need help. >
For sure I need help, but not the kind you had imagined in 2023. Anyway: it does not exist "collectible entropy", just structured information. Because once "entropy" has been collected becomes data not entropy. Sometimes that structure does not exist because is white-noise random. Grok defined this kind of "behaviour" as typical of usenet trolling: when people create theoretical problems by trick definitions or precision expectancy which are not context related or fact based. I don't trust Grok, I trust that machine can collect and reveal precious information by talking about quak machines or whatever else. Considering that Grok is the AI adopted by the US military (and Pentagon) you might have just a glimpse of HOW much it can reveal under certain circumstances. Physics still wonders what entropy is and here somebody pretends to collect it. Let me be clear, there are just "smart" or "dumb" ways of messing bits, and nothing else. However, this is not just "steryl" and "polemic" years-after answer. Military security is strongly related to this stuff, which is probably the reason why so many people (even experts) are so much confused about the fundamentals (because you have been convicted of absurdities, you act coherently but heractly -- also known as who can let people trust absurdities can push them to commit atrocities). Here we are: yes I need help, but among us, you all apparently are in need of much more. ~> https://github.com/robang74/working-in-progress/blob/main/random.txt If a process like the one described here is operated by the CPU microcode, it would be safely bound by the CPU itself, a modern CPUs can be seen as very good random generators because of their jitter unpredictability in executing tasks. How good is this kind of random generator based on CPU arch and microcode to be good at providing unbreakable cryptography assuming the whole process is made at the state of art? Who design the chip (or made the chip) and deliver the microcode can definitely have access to every ciphered communications no matter what. (Good morning and yes, I am the guy who is claiming "that" money: https://github.com/sponsors/robang74) Best regards, -- Roberto A. Foglietta FGLRRT74C26D969F +49.176.274.75.661 +39.349.33.30.697 _______________________________________________ busybox mailing list [email protected] https://lists.busybox.net/mailman/listinfo/busybox
