chickentendrils

joined 7 months ago
[–] [email protected] 4 points 7 months ago

Yeah as long as the setup for the device symlinked its device path to /dev/random or you did that yourself. Stuff I used had a Java SDK walter-breakdown

[–] [email protected] 17 points 7 months ago* (last edited 7 months ago) (4 children)

Yeah, not USB but in principle it's the same whether it's PCI or whatever. There's no way to prove an RNG is truly random really just have to rely on validating subsets of its output look random. NIST has published recommendations for sampling RNGs.

Here's the title:

A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications

I don't think there's a real need unless it's regulated to need some dedicated HW RNG.

[–] [email protected] 5 points 7 months ago (1 children)

That sucks. Do you have a hitchhiker's thumb at all? (Slight or even 90 deg bend in thumb)

Here's hoping I got the hand joint genes from the side of my family that lived to be 95-96 and were still building barns, and not the side that had gout and died in their 60s.

[–] [email protected] 2 points 7 months ago

Mozz doesn't phase me. There's dairy that would wreck me but that one never did.

[–] [email protected] 20 points 7 months ago (1 children)

Alright just admit to rational fascism

[–] [email protected] 18 points 7 months ago

A real danger? no. A "danger" that can be taken advantage of to justify more weapons contracts, police & surveillance technology transfers, and maybe an intervention a couple decades from now in UA after some stuff explodes up and it's pinned on Azov? If they can still conduct themselves that way, surely they will.

[–] [email protected] 11 points 7 months ago

Pre-SMO but there were these weapons neonazis who went to UA brought back to Italy: https://www.reuters.com/article/world/italy-seizes-air-to-air-missile-guns-in-raids-on-neo-nazis-idUSKCN1UA1SZ/

This one busted in 2022 also linked to Azov and such:

https://www.vice.com/en/article/italy-neo-nazis-order-of-hagal/

[–] [email protected] 3 points 7 months ago

The attacker can just be smarter and use various ASNs + out-proxies for their backend.

My background is small-world network in distributed systems and anti-censorship software like Hyphanet. If the goal is to evict/lessen the purview of the metadata harvesting nodes then some version of web-of-trust + proof of work could be implemented.

[–] [email protected] 26 points 7 months ago (13 children)

I got the most LIB text ever on E Day

view more: ‹ prev next ›