[147962] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] What's a Plausible Attack On Random Number

daemon@ATHENA.MIT.EDU (James A. Donald)
Sat Nov 2 12:23:48 2013

X-Original-To: cryptography@metzdowd.com
Date: Sat, 02 Nov 2013 12:55:52 +1000
From: "James A. Donald" <jamesd@echeque.com>
To: cryptography@metzdowd.com
In-Reply-To: <CADpjbE17V5Y8_AW-ZJxFka-i4LaqjjdzdTU-CTiotoRTbx1k1Q@mail.gmail.com>
Reply-To: jamesd@echeque.com
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

On 2013-11-01 04:48, David Mercer wrote:
> "First boot" really refers to "first post-install boot", and is one of
> the lowest entropy points in a systems life-cycle.

The problem seems to be that some software early in the boot process may 
want randomness.

Bad software! Don't do that!
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post