![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
home | help | back | first | fref | pref | prev | next | nref | lref | last | post |
X-Original-To: cryptography@metzdowd.com From: Jerry Leichter <leichter@lrw.com> In-Reply-To: <kmltj62xasascklyhm6aimk5.1383512947483@email.android.com> Date: Sun, 3 Nov 2013 18:09:08 -0500 To: Kent Borg <kentborg@borg.org> Cc: Yaron Sheffer <yaronf.ietf@gmail.com>, "cryptography@metzdowd.com List" <cryptography@metzdowd.com>, John Gilmore <gnu@toad.com>, David Mercer <radix42@gmail.com> Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com On Nov 3, 2013, at 4:09 PM, Kent Borg wrote: > Yaron Sheffer suggested: >> Suppose I'm an (entropy) poor home router in an (entropy) poor home, >> with just one desktop machine behind me. We could have the PC send some >> random material in the DHCP *request*, and the router is free to mix it >> into its very shallow entropy pool. > > Starting to sound so neighborly: whenever you think a neighbor could maybe use some entropy, offer a little. (To be mixed with other sources!) How many bits in a cupful of entropy? -- Jerry _______________________________________________ The cryptography mailing list cryptography@metzdowd.com http://www.metzdowd.com/mailman/listinfo/cryptography
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
home | help | back | first | fref | pref | prev | next | nref | lref | last | post |