GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Conversation

Notices

  1. Embed this notice
    Ryan Castellucci :nonbinary_flag: (ryanc@infosec.exchange)'s status on Saturday, 04-Jan-2025 21:53:58 JST Ryan Castellucci :nonbinary_flag: Ryan Castellucci :nonbinary_flag:
    • Sophie Schmieg

    It would be really funny if this was used to generate cryptocurrency keys.

    FWIW, you can do a serviceable "software only" TRNG based on comparing the jitter of two clock sources.

    This is some "Poe's law" stuff, could be satire, could be deranged tech bro.

    Via @sophieschmieg

    In conversation about 6 months ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/113/770/169/600/407/560/original/4761eefe9ce145d1.jpeg
    • Embed this notice
      Tableflip (lookatableflip@infosec.exchange)'s status on Saturday, 04-Jan-2025 21:56:41 JST Tableflip Tableflip
      in reply to
      • Sophie Schmieg

      @ryanc @sophieschmieg didn’t this already exist for ages with /dev/random

      In conversation about 6 months ago permalink
    • Embed this notice
      Ryan Castellucci :nonbinary_flag: (ryanc@infosec.exchange)'s status on Saturday, 04-Jan-2025 22:02:29 JST Ryan Castellucci :nonbinary_flag: Ryan Castellucci :nonbinary_flag:
      in reply to
      • Sophie Schmieg
      • Tableflip

      @Lookatableflip @sophieschmieg /dev/random isn't software only

      In conversation about 6 months ago permalink
    • Embed this notice
      David Chisnall (*Now with 50% more sarcasm!*) (david_chisnall@infosec.exchange)'s status on Saturday, 04-Jan-2025 22:54:15 JST David Chisnall (*Now with 50% more sarcasm!*) David Chisnall (*Now with 50% more sarcasm!*)
      in reply to
      • Sophie Schmieg
      • Tableflip

      @ryanc @Lookatableflip @sophieschmieg That depends a lot on the system. It will use all of the entropy sources available to the kernel. On modern systems, that typically includes at least one hardware entropy source. These are often a set of free-running ring oscillators, which then feed into some cryptographic hash function for whitening.

      Without these, it will use much weaker things. The contents of the password file, the hash of the kernel binary, the cycle count at the time interrupts fire or devices are attached, and so on.

      There have been some high-profile vulnerabilities from embedded devices that did things like generating private keys on first boot, with deterministic device attach time, and ended up with a handful of different private keys across the entire device fleet.

      In conversation about 6 months ago permalink
    • Embed this notice
      Citty (citty@infosec.exchange)'s status on Saturday, 04-Jan-2025 23:21:28 JST Citty Citty
      in reply to
      • Sophie Schmieg

      @ryanc @sophieschmieg If I had the resources and wasn't the kind of person they'd probably call a FUDer at best, I wonder how they'd respond to "I have X thousand dollars, all you have to do is release a paper that proves it works"

      In conversation about 6 months ago permalink
    • Embed this notice
      Sophie Schmieg (sophieschmieg@infosec.exchange)'s status on Sunday, 05-Jan-2025 02:59:26 JST Sophie Schmieg Sophie Schmieg
      in reply to
      • David Chisnall (*Now with 50% more sarcasm!*)
      • Tableflip

      @david_chisnall @ryanc @Lookatableflip and don't forget the whole Debian random number generator debacle. That was probably one of the motivating factors for adding RDRAND and friends to modern CPUs.

      In conversation about 6 months ago permalink
    • Embed this notice
      Ryan Castellucci :nonbinary_flag: (ryanc@infosec.exchange)'s status on Sunday, 05-Jan-2025 02:59:26 JST Ryan Castellucci :nonbinary_flag: Ryan Castellucci :nonbinary_flag:
      in reply to
      • Sophie Schmieg
      • David Chisnall (*Now with 50% more sarcasm!*)
      • Tableflip

      @sophieschmieg @david_chisnall @Lookatableflip I don't consider interrupt timing to be "software only", fwiw.

      In conversation about 6 months ago permalink
    • Embed this notice
      David Chisnall (*Now with 50% more sarcasm!*) (david_chisnall@infosec.exchange)'s status on Sunday, 05-Jan-2025 05:43:32 JST David Chisnall (*Now with 50% more sarcasm!*) David Chisnall (*Now with 50% more sarcasm!*)
      in reply to
      • Sophie Schmieg
      • Tableflip

      @ryanc @sophieschmieg @Lookatableflip I guess it’s not pure software, but anything running on a real computer has a hardware component. The randomness bit is pure software, using whatever it can from the environment as entropy sources, but none of the entropy sources alone (without a hardware random number generator) has enough entropy to be useful, and interrupt timings can sometimes be under attacker control (some fun attacks from the ‘90s involved sending packets at specific timing to influence the entropy collection).

      In conversation about 6 months ago permalink
    • Embed this notice
      Ryan Castellucci :nonbinary_flag: (ryanc@infosec.exchange)'s status on Sunday, 05-Jan-2025 22:38:28 JST Ryan Castellucci :nonbinary_flag: Ryan Castellucci :nonbinary_flag:
      in reply to
      • Sophie Schmieg
      • David Chisnall (*Now with 50% more sarcasm!*)
      • Tableflip

      @david_chisnall @sophieschmieg @Lookatableflip And thus the "AI" solution is not pure software either.

      Deep down, it's relying on a PRNG seeded from something.

      In conversation about 6 months ago permalink

Feeds

  • Activity Streams
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.