On Jan 13, 2008 11:23 AM, fooler mail <[EMAIL PROTECTED]> wrote:
> On Jan 13, 2008 12:00 AM, Drexx Laggui [personal] <[EMAIL PROTECTED]> wrote:
> > 12Jan2008 (UTC +8)
> >
> > I guess that with regular PCs, "badblocks -c 512 -s -w -t random" will
> > be good enough and a bit more useful. With with higher-risk computers
> > however, I'd recommend the use of "dd if=/dev/urandom". For the truly
> > secure machines that have the luxury of more preparation time, "dd
> > if=/dev/random" is the way to go.
>
> i wont recommend badblocks with -t random parameter for scrubbing your
> disk as it uses the C standard library random() function ... random()
> function uses a non-linear additive feedback random generator as this
> would easily for cryptanalyst to decrypt your data....
>
> ...

In the RNG front:
random(), srandom(), rand(), srand() are weak random number
generators. A better random generator is arc4random(). If I am not
mistaken there are patches for Glibc to incorporate arc4random().

   Ed <http://blog.eonsec.com>
_________________________________________________
Philippine Linux Users' Group (PLUG) Mailing List
[email protected] (#PLUG @ irc.free.net.ph)
Read the Guidelines: http://linux.org.ph/lists
Searchable Archives: http://archives.free.net.ph

Reply via email to