On Wed, Oct 02, 2013 at 11:57:24PM -0500, Paul Elliott wrote:
What is the quality of the Hardware RNG in the Raspberry Pi?
Fairly unknown. The current driver used in Raspbian and so on, which
exposes the RNG directly at /dev/hwrng is definitely *not* safe to use
raw -- it needs a mixing pool at
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Curious; anyone know much about what these inexpensive (comparatively,
price seems steadily falling) ASIC Block Erupter USB Bitcoin miners
can be adapted to doing? Could they be repurposed as RNG sources?
I know they are designed /
On Thu, Oct 3, 2013 at 2:43 AM, d.nix d@comcast.net wrote:
...
Curious; anyone know much about what these inexpensive (comparatively,
price seems steadily falling) ASIC Block Erupter USB Bitcoin miners
can be adapted to doing? Could they be repurposed as RNG sources?
at best you *might*
d.nix d@comcast.net writes:
Curious; anyone know much about what these inexpensive (comparatively, price
seems steadily falling) ASIC Block Erupter USB Bitcoin miners can be adapted
to doing? Could they be repurposed as RNG sources?
Very little, and no. They're basically custom
Hi Lib Tech
The Citizen Lab published a new research paper on URL filtering and censorship,
which presents an initial methodology for identifying and confirming the use of
URL filtering products around the world. The authors leverage the fact that many
of these products accept user-submitted
Hi Lib Tech
The Citizen Lab published a new research paper on URL filtering and censorship,
which presents an initial methodology for identifying and confirming the use of
URL filtering products around the world. We leverage the fact that many of these
products accept user-submitted sites for
So, Silent Circle (well, Silent Phone) is finally open source!
At least, the previous version, with the next one coming in a couple of weeks.
This, to me, is absolutely wonderful news, as it is finally possible to get a
proper security audit of the whole shebang.
Github issue:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Very little, and no. They're basically custom Bitcoin-mining
ASICs, I looked at one a while back for use in password-cracking
and they're really not suited for it at all, you load a vector in
and say go but since they're quite I/O-limited you
DALLAS — One day last May, Ladar Levison returned home to find an
F.B.I. agent’s business card on his Dallas doorstep. So began a
four-month tangle with law enforcement officials that would end with
Mr. Levison’s shutting the business he had spent a decade building and
becoming an unlikely hero of