X-Git-Url: http://info9.net/gitweb/?p=wiki.git;a=blobdiff_plain;f=tmarble%2Fposts%2FUSB_TRNG.mdwn;h=0bf4e26691eca75f3e4510f2852d673d04b3df61;hp=e238ec4bd53a55bf643dd5baa4dca69c3edc3df9;hb=d73aa0cb665c90dda76f80329ef488f88ff01e06;hpb=5c88f54c7fece695b591e53c3f2241713db489f8 diff --git a/tmarble/posts/USB_TRNG.mdwn b/tmarble/posts/USB_TRNG.mdwn index e238ec4..0bf4e26 100644 --- a/tmarble/posts/USB_TRNG.mdwn +++ b/tmarble/posts/USB_TRNG.mdwn @@ -11,15 +11,15 @@ Yesterday I had a blast presenting my talk to create a completely open hardware and Free software true random number generator. -I my talk I mention the rationale for gathering more entropy: -The Linux urandom boot-time entropy hole as described in +In my talk I mention the rationale for gathering more entropy: +*The Linux urandom boot-time entropy hole* as described in the paper -**[Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices][ehole]**. +[Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices][ehole]. I also mention some of the difficulty in assessing RNG quality for security applications as highlighted by Matthew Green in his blog post -**[How do you know if an RNG is working?][greenrng]**. +[How do you know if an RNG is working?][greenrng]. I've been lucky to work on this design with [Bdale Garbee][bdale] and [Keith Packard][keithp].