From 364ebeaeb25a3c939e5f4ba0fcf31d257720f9d4 Mon Sep 17 00:00:00 2001 From: Tom Marble Date: Wed, 27 Aug 2014 10:37:56 -0500 Subject: [PATCH] formatting fixes --- tmarble/posts/USB_TRNG.mdwn | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/tmarble/posts/USB_TRNG.mdwn b/tmarble/posts/USB_TRNG.mdwn index cf5495c..36e0676 100644 --- a/tmarble/posts/USB_TRNG.mdwn +++ b/tmarble/posts/USB_TRNG.mdwn @@ -14,21 +14,21 @@ random number generator. I my talk I mention the rationale for gathering more entropy: The Linux urandom boot-time entropy hole as described in the paper -[Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices][ehole]. +**[Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices][ehole]**. I also mention some of the difficulty in assessing RNG quality for security applications as highlighted by Matthew Green in his blog post -[How do you know if an RNG is working?][greenrng]. +**[How do you know if an RNG is working?][greenrng]**. I've been lucky to work on this design with [Bdale Garbee][bdale] and [Keith Packard][keithp]. If you'd like to learn more you can... -* Download the presentation (see below) -* Check out the web page for [USB TRNG][usbtrng] -* Join us on IRC OFTC #altusmetrum -* Join the [trng mailing list][trng] + * Download the presentation (see below) + * Check out the web page for [USB TRNG][usbtrng] + * Join us on IRC OFTC #altusmetrum + * Join the [trng mailing list][trng] Let [[me|/tmarble]] know if you'd like to get involved! @@ -42,7 +42,7 @@ Let [[me|/tmarble]] know if you'd like to get involved! [altusmetrum]: http://altusmetrum.org/ [bdale]: http://gag.com/bdale [keithp]: http://keithp.com/keithp -[trng]: http://lists.gag.com/mailman/listinfo/trng +[trng]: http://altusmetrum.org/USBtrng/ [usbtrng]: http://lists.gag.com/mailman/listinfo/trng [debvideo]: https://wiki.debconf.org/wiki/DebConf14/Videostream#Recordings [ehole]: https://factorable.net/weakkeys12.extended.pdf -- 2.45.2