Matches for Entropy, 516 total results Sorted by newest | relevance
27-03-2018 13:52:13 <adlai> in one case, you're riding trivial gradients; in the other, you're fucking with tidal entropy
27-03-2018 13:49:55 <adlai> at worst, you've never even heard of entropy
29-03-2017 14:58:34 <asciilifeform> ( nic as a source of entropy has obvious problems )
29-03-2017 14:56:22 <asciilifeform> no entropy at all
29-03-2017 14:56:01 <asciilifeform> ( it is actually a fairly common situation on small embedded gadgets, where there is no keyboard or disk entropy )
29-03-2017 14:55:00 <kakobrekla> anyway re question 'what distro' had 0 entropy_avail ... turns out its not distro depended but a combo of non x86 hw and 4.x kernel
28-03-2017 09:22:13 <pankkake> one program can easily drain the entropy
28-03-2017 09:07:53 <kakobrekla> cat /proc/sys/kernel/random/entropy_avail
04-01-2017 16:32:29 <asciilifeform> likewise the user can easily verify that the thing does not attempt to produce output if the analogue entropy is disconnected
29-12-2016 22:23:12 <jurov> but these schmucks ... slipping the notion that fuzzing/satsolving prng algorithm for "entropy loss" is "technical assurance"
17-12-2016 20:40:43 <asciilifeform> but at the same time it is the only, afaik, hardware rng in the world that 1) comes apart into testable pieces 2) doesn't hash, or otherwise lie about the entropy
03-12-2016 08:23:45 <funkenstein_> "In short : without entropy, you don't exist, because without entropy -- there is no you " interesting viewpoint. Perhaps a faraday cage helps too.
03-12-2016 08:19:58 <funkenstein_> but you point that out already basically, machine generated entropy is a sin, etc.
03-12-2016 08:19:43 <funkenstein_> "The mathematical entropy of the digits of Pi is very high by any measure" well it is zero by Martin-L?f measure
27-10-2016 19:09:48 <funkenstein_> i create and hold all keys using entropy i provide
27-10-2016 19:02:38 <funkenstein_> correct me if i'm wrong, the complaint was the the implementation of P2SH provided not enough entropy per address
29-09-2016 14:41:01 <asciilifeform> http://log.bitcoin-assets.com/?date=29-09-2016#1455712 << milking cpu load for entropy is egregiously idiotic, i did not find it worthy of comment then or now.
08-09-2016 15:05:50 <funkenstein_> "We have presented an ultrafast quantum entropy source on a photonic integrated circuit (QES-PIC) for use in quantum random number generation (QRNG). The resulting device shows high performance, including bit rate, degree of randomness (low correlation values), and stability, in a miniaturized geometry that also integrates the receiver. "
Next Page »