There are potentially few useful entropy sources on an isolated system with
its peripherals removed that has just booted (for example), so a cat
walking across the keyboard can be used to strengthen the randomness at
little cost. It's mostly defense-in-depth.
On Mon, Jan 22, 2018 at 1:59 AM, Bastien Teinturier via zapps-wg <
> It's a good point, and I was wondering why this "manual input" entropy is
> I don't understand what it adds to the entropy implicitly grabbed from the
> system by the executable.
> If we assume that an adversary is able to monitor the system and replicate
> the entropy of the random generator used in the code, that adversary is
> probably able to grab the input to the process as well right?
> I'm interested in learning more about why you felt it was necessary to ask
> the user to provide some random input.
> On Sat, Jan 20, 2018 at 2:04 PM, Daira Hopwood via zapps-wg <
> zapps...@lists.z.cash.foundation> wrote:
>> On 18/01/18 13:46, Bastien Teinturier via zapps-wg wrote:
>> > Powers of Tau Attestation
>> Notice that PowersOfTau_2.jpg leaks the additional entropy provided
>> to the computation. That's ok, it uses operating system entropy as
>> well; just noting that future participants might want to avoid that.
>> Daira Hopwood ⚧Ⓐ
> [image: stratumn-logo.jpg]
> Bastien Teinturier
> Senior Software Engineer
> Stratumn SAS, 1 bis Cité Paradis, 75010 Paris, France
> +33 6 28 57 71 59 <+33%206%2028%2057%2071%2059> • bast...@stratumn.com •
> stratumn.com <https://stratumn.com/careers>
> We are hiring <https://stratumn.com/careers> • Read about us
> <http://blog.stratumn.com> • Twitter <https://twitter.com/stratumnhq>