[cryptography] Which encryption chips are compromised?

coderman coderman at gmail.com
Thu Dec 12 11:20:44 EST 2013

On Thu, Dec 12, 2013 at 7:08 AM, John Young <jya at pipeline.com> wrote:
> Please stop this suicidal, treacherous discussion. You're undermining
> the global industry of weak crypto and comsec. That counts as economic
> terrorism in all the countries who abide arms control, export control,
> copyright, capitalism, heirarchical rule, suppression of dissent, lawful
> spying, breaking and entering black jobs, ubiquitous spying on each other
> and everybody else, ...
> ... Sure, call for outraged dissent,
> fine, great, if that moves the ponzi, balloons those bitcoins.

let it be known:

in the event of my untimely demise under suspicious circumstances, i
will my coins to JYA so he may bless my passing with grand oration and
strong tale as he is so adept at providing.  *grin*

on a serious note, the useful steps are clear:
1. Intel releases raw access to noise samples
2. NIST defining and mandating a design that also supports raw sample
access, (we could change subject here to discuss something pleasant
like on-line checks and continuous checks,)
3. OS distributions include userspace entropy scavenging daemons
(haveged, dakarand, etc) to complement properly vetted hardware
entropy sources run in a conservative fashion.  default is set safe,
not fast.

is that so much to ask?

More information about the cryptography mailing list