All Questions
4 questions
1vote
1answer
526views
Feeding entropy pool with my own data [duplicate]
Let's state that I have a huge bunch of truly unpredictable random data in file "random.bin". The random data has been created outside of my system and has been securely transfered into my ...
4votes
1answer
845views
Does rngd -r /path/to/file inject into /dev/urandom in addition to /dev/random?
I'm new to the /dev/random and /dev/urandom pipes in general and have an application calling from /dev/urandom which I'm attempting to inject entropy into. I'd prefer not to change the source for ...
9votes
1answer
5kviews
Is reading from /dev/urandom on macOS Catalina a safe way to produce cryptographically secure data?
I'm reading a lot about entropy on macOS... I know it doesn't use Yarrow anymore as per this FIPS 140-02 doc a NIST compliant DRBG. I read a lot: https://github.com/briansmith/ring/pull/398 How ...
3votes
1answer
646views
Would `cat /dev/random` be a denial of service to any other users of `/dev/random`?
As in the question. Wouldn't cat /dev/random decrease the entropy estimate until it blocks, which forces the random device to block for all applications on the current system?