[cryptography] Which encryption chips are compromised?

coderman coderman at gmail.com
Tue Dec 10 22:42:26 EST 2013


On Tue, Dec 10, 2013 at 7:12 PM, coderman <coderman at gmail.com> wrote:
> ... see mtrngd with MSR bits set no whitening, max sample, max
> freq. into mix + conservative estimate before /dev/random write.

last release was 0.7 in 2007,
 https://peertech.org/dist/mtrngd-0.7-2007.tgz

sha256 6ea59af43de166ad96740c0cec4169a18383c058899c97b791364208d0c68221


no, it doesn't work with anything else but Padlock.  you should be
using haveged as well!
 (the more the merrier...)



>   cross post from cpunks list to save cert for https://peertech.org/ with sha256
>   C6:5E:C0:43:56:84:2E:11:A3:35:C8:AC:A9:70:96:7B:A5:2E:5B:77
>   from godaddy with their ident
>   keyid:40:C2:BD:27:8E:CC:34:83:30:A2:33:D7:FB:6C:B3:F0:B4:2C:80:CE

per WTF's:
sorry, not live yet.  and yes, bounty is for server or leak or auth
bypass or any other vuln on site. you get wallet, you get at least
that many. find anything remotely useful for escalation or info disc.
or ???, yes, you probably get a subset of bounty per my appreciation
for your find.


More information about the cryptography mailing list