[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[cryptography] Which encryption chips are compromised?
On Thu, Dec 12, 2013 at 7:08 AM, John Young <[email protected]> wrote:
> Please stop this suicidal, treacherous discussion. You're undermining
> the global industry of weak crypto and comsec. That counts as economic
> terrorism in all the countries who abide arms control, export control,
> copyright, capitalism, heirarchical rule, suppression of dissent, lawful
> spying, breaking and entering black jobs, ubiquitous spying on each other
> and everybody else, ...
> ... Sure, call for outraged dissent,
> fine, great, if that moves the ponzi, balloons those bitcoins.
let it be known:
in the event of my untimely demise under suspicious circumstances, i
will my coins to JYA so he may bless my passing with grand oration and
strong tale as he is so adept at providing. *grin*
on a serious note, the useful steps are clear:
1. Intel releases raw access to noise samples
2. NIST defining and mandating a design that also supports raw sample
access, (we could change subject here to discuss something pleasant
like on-line checks and continuous checks,)
3. OS distributions include userspace entropy scavenging daemons
(haveged, dakarand, etc) to complement properly vetted hardware
entropy sources run in a conservative fashion. default is set safe,
not fast.
is that so much to ask?