
“The revelations are having a direct effect on the way FreeBSD will use hardware-based random number generators to seed the data used to ensure cryptographic systems can’t be easily broken by adversaries. Specifically, ‘RDRAND’ and ‘Padlock’—RNGs provided by Intel and Via respectively—will no longer be the sources FreeBSD uses to directly feed random numbers into the /dev/random engine used to generate random data in Unix-based operating systems. Instead, it will be possible to use the pseudo random output of RDRAND and Padlock to seed /dev/random only after it has passed through a separate RNG algorithm known as ‘Yarrow.'”
Related posts:
Airbus confirms software configuration error caused plane crash
Nowhere Else But Detroit
Cyber thieves blamed for botnet Bitcoin heist: researchers
Utah Undercover Cops Kill Woman Heroin User
Brave Police Save Town From Man Selling Veggies
Pepe Escobar: Obama set for holy Tomahawk war
The Private Prison Companies Profiting From Family Separations
TSA Pursues Administrative Trial Against Man Who Disrobed At Airport Checkpoint
Cisco Won't Buy Any US Companies Or Hire Any US Workers Until The Tax Code Is Changed
A Sure-Fire Way to Control the Price of Bitcoin?
How Mobile Devices Are Changing Africa
Family Confronted With Armed Military Police After Leaving Museum
What Country Is This? Forced Blood Draws, Cavity Searches and Colonoscopies
Kansas Law: No More Government Money Promoting Gun Control
Study: Booze Damages the Young Brain, Pot Does Not