"Specifically, "RDRAND" and "Padlock"—RNGs provided by Intel and Via respectively—will no longer be the sources FreeBSD uses to directly feed random numbers into the /dev/random engine used to generate random data in Unix-based operating systems. Instead, it will be possible to use the pseudo random output of RDRAND and Padlock to seed /dev/random only after it has passed through a separate RNG algorithm known as "Yarrow." Yarrow, in turn, will add further entropy to the data to ensure intentional backdoors, or unpatched weaknesses, in the hardware generators can't be used by adversaries to predict their output." [1]

Can something like this be done with Tails? Entropy is fairly important to the proper function of Tor and other Tails software that generate crypto keys.

-Kristov

Links:
[1] http://arstechnica.com/security/2013/12/we-cannot-trust-intel-and-vias-chip-based-crypto-freebsd-developers-say/

_______________________________________________
Tails-support mailing list
[email protected]
https://mailman.boum.org/listinfo/tails-support

Reply via email to