<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    <div class="moz-cite-prefix">On 12/16/2014 6:06 AM, Francisco
      Guerreiro wrote:<br>
    </div>
    <blockquote
cite="mid:CADKjWyr0CP-iLqAB3_48FjninhCP8AQ-RxAExEcSs6wTY7Kb3A@mail.gmail.com"
      type="cite">
      <meta http-equiv="Context-Type" content="text/html; charset=UTF-8">
      <div dir="ltr"><span>why is that onerng better than </span><a
          moz-do-not-send="true"
          href="http://www.seeedstudio.com/wiki/FST-01" target="_blank">http://www.seeedstudio.com/wiki/FST-01</a><span> ?</span>
        <div><br>
        </div>
        <div>why not fund something actually new ?</div>
      </div>
      <div class="gmail_extra"><br>
        <div class="gmail_quote">On Tue, Dec 16, 2014 at 10:23 AM, Ben
          Laurie <span dir="ltr"><<a moz-do-not-send="true"
              href="mailto:ben@links.org" target="_blank">ben@links.org</a>></span>
          wrote:
          <blockquote class="gmail_quote"><span class="">On 15 December
              2014 at 19:18, ianG <<a moz-do-not-send="true"
                href="mailto:iang@iang.org">iang@iang.org</a>> wrote:<br>
              > <a moz-do-not-send="true"
href="https://www.kickstarter.com/projects/moonbaseotago/onerng-an-open-source-entropy-generator"
                target="_blank">https://www.kickstarter.com/projects/moonbaseotago/onerng-an-open-source-entropy-generator</a><br>
              ><br>
              > About this project<br>
              ><br>
              > After Edward Snowden's recent revelations about how
              compromised our internet<br>
              > security has become some people have worried about
              whether the hardware<br>
              > we're using is compromised - is it? We honestly don't
              know, but like a lot<br>
              > of people we're worried about our privacy and
              security.<br>
              ><br>
              > What we do know is that the NSA has corrupted some of
              the random number<br>
              > generators in the OpenSSL software we all use to
              access the internet, and<br>
              > has paid some large crypto vendors millions of
              dollars to make their<br>
              > software less secure. Some people say that they also
              intercept hardware<br>
              > during shipping to install spyware.<br>
              <br>
            </span>I don't really get the relevance to OpenSSL - Dual EC
            DRBG was<br>
            vulnerable regardless of the entropy source. And, as already<br>
            mentioned, not actually vulnerable in OpenSSL anyway.<br>
            <span class=""><br>
              > We believe it's time we took back ownership of the
              hardware we use day to<br>
              > day. This project is one small attempt to do that -
              OneRNG is an entropy<br>
              > generator, it makes long strings of random bits from
              two independent noise<br>
              > sources that can be used to seed your operating
              system's random number<br>
              > generator. This information is then used to create
              the secret keys you use<br>
              > when you access web sites, or use cryptography
              systems like SSH and PGP.<br>
              ><br>
              > Openness is important, we're open sourcing our
              hardware design and our<br>
              > firmware, our board is even designed with a removable
              RF noise shield (a<br>
              > 'tin foil hat') so that you can check to make sure
              that the circuits that<br>
              > are inside are exactly the same as the circuits we
              build and sell. In order<br>
              > to make sure that our boards cannot be compromised
              during shipping we make<br>
              > sure that the internal firmware load is signed and
              cannot be spoofed.<br>
              <br>
            </span>I am curious if there's any evidence that avalanche
            diodes and Zigbee<br>
            receivers are immune to outside influence (one would've
            thought not in<br>
            the case of the receiver, at least, which is designed to be
            influenced<br>
            by the outside)?<br>
            <div class="HOEnZb">
              <div class="h5">_______________________________________________<br>
                cryptography mailing list<br>
                <a moz-do-not-send="true"
                  href="mailto:cryptography@randombit.net">cryptography@randombit.net</a><br>
                <a moz-do-not-send="true"
                  href="http://lists.randombit.net/mailman/listinfo/cryptography"
                  target="_blank">http://lists.randombit.net/mailman/listinfo/cryptography</a><br>
              </div>
            </div>
          </blockquote>
        </div>
      </div>
      <br>
      <fieldset class="mimeAttachmentHeader"></fieldset>
      <br>
      <pre wrap="">_______________________________________________
cryptography mailing list
<a class="moz-txt-link-abbreviated" href="mailto:cryptography@randombit.net">cryptography@randombit.net</a>
<a class="moz-txt-link-freetext" href="http://lists.randombit.net/mailman/listinfo/cryptography">http://lists.randombit.net/mailman/listinfo/cryptography</a>
</pre>
    </blockquote>
    Nuk isn't very flexible.  So the product is original.<br>
    <br>
    <br>
    <pre class="moz-signature" cols="72">-- 
Kevin
</pre>
  
<br /><br />
<hr style='border:none; color:#909090; background-color:#B0B0B0; height: 1px; width: 99%;' />
<table style='border-collapse:collapse;border:none;'>
        <tr>
                <td style='border:none;padding:0px 15px 0px 8px'>
                        <a href="http://www.avast.com/">
                                <img border=0 src="http://static.avast.com/emails/avast-mail-stamp.png" />
                        </a>
                </td>
                <td>
                        <p style='color:#3d4d5a; font-family:"Calibri","Verdana","Arial","Helvetica"; font-size:12pt;'>
                                This email is free from viruses and malware because <a href="http://www.avast.com/">avast! Antivirus</a> protection is active.
                        </p>
                </td>
        </tr>
</table>
<br />
</body>
</html>