I my talk I mention the rationale for gathering more entropy:
The Linux urandom boot-time entropy hole as described in
the paper
-[Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices][ehole].
+**[Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices][ehole]**.
I also mention some of the difficulty in assessing RNG
quality for security applications as highlighted by
Matthew Green in his blog post
-[How do you know if an RNG is working?][greenrng].
+**[How do you know if an RNG is working?][greenrng]**.
I've been lucky to work on this design with [Bdale Garbee][bdale]
and [Keith Packard][keithp].
If you'd like to learn more you can...
-* Download the presentation (see below)
-* Check out the web page for [USB TRNG][usbtrng]
-* Join us on IRC OFTC #altusmetrum
-* Join the [trng mailing list][trng]
+ * Download the presentation (see below)
+ * Check out the web page for [USB TRNG][usbtrng]
+ * Join us on IRC OFTC #altusmetrum
+ * Join the [trng mailing list][trng]
Let [[me|/tmarble]] know if you'd like to get involved!
[altusmetrum]: http://altusmetrum.org/
[bdale]: http://gag.com/bdale
[keithp]: http://keithp.com/keithp
-[trng]: http://lists.gag.com/mailman/listinfo/trng
+[trng]: http://altusmetrum.org/USBtrng/
[usbtrng]: http://lists.gag.com/mailman/listinfo/trng
[debvideo]: https://wiki.debconf.org/wiki/DebConf14/Videostream#Recordings
[ehole]: https://factorable.net/weakkeys12.extended.pdf