"Specifically, "RDRAND" and "Padlock"—RNGs provided by Intel and Via
respectively—will no longer be the sources FreeBSD uses to directly feed
random numbers into the /dev/random engine used to generate random data
in Unix-based operating systems. Instead, it will be possible to use the
pseudo random output of RDRAND and Padlock to seed /dev/random only
after it has passed through a separate RNG algorithm known as "Yarrow."
Yarrow, in turn, will add further entropy to the data to ensure
intentional backdoors, or unpatched weaknesses, in the hardware
generators can't be used by adversaries to predict their output." [1]
Can something like this be done with Tails? Entropy is fairly important
to the proper function of Tor and other Tails software that generate
crypto keys.
-Kristov
Links:
[1]
http://arstechnica.com/security/2013/12/we-cannot-trust-intel-and-vias-chip-based-crypto-freebsd-developers-say/
_______________________________________________
Tails-support mailing list
[email protected]
https://mailman.boum.org/listinfo/tails-support