
“The revelations are having a direct effect on the way FreeBSD will use hardware-based random number generators to seed the data used to ensure cryptographic systems can’t be easily broken by adversaries. Specifically, ‘RDRAND’ and ‘Padlock’—RNGs provided by Intel and Via respectively—will no longer be the sources FreeBSD uses to directly feed random numbers into the /dev/random engine used to generate random data in Unix-based operating systems. Instead, it will be possible to use the pseudo random output of RDRAND and Padlock to seed /dev/random only after it has passed through a separate RNG algorithm known as ‘Yarrow.'”
Related posts:
Nigel Farage: Hague should resign as foreign secretary over Syria vote
Post 9/11 AUMF Law Gives Trump Power to Wage Perpetual War
As bitcoin booms, so does bitcoin bank robbery
DC, Maryland: Speed Camera Firms Move To Hide Evidence
Kennedy Family Believes CIA Killed JFK, Robert Jr. Claims In New Tell-All
Security Theater Marches On With TSA "Freeze Drills"
Texas begins replacing paved roads with gravel due to lack of funding
Dutch PM: Eurozone needs exit clause
Amphibious landing craft docks at crowded beach in Russia
Meet the Human Smugglers
Nepal police seize smuggled gold bound for India
Renewal of FISA Section 702 with 'abouts' collection slated for Thursday
China Is Moving in the Right Direction on Tariffs
Scope of Secretive FBI National Security Letters Revealed by First Lifted Gag Order
Hillary Clinton wants “Manhattan-like project” to break encryption