Timeline for Feeding /dev/random entropy pool?
Current License: CC BY-SA 2.5
2 events
| when toggle format | what | by | license | comment | |
|---|---|---|---|---|---|
| Jan 17, 2011 at 5:48 | comment | added | D.W. | This answer is not accurate in practice, or is worded in a confusing way. In practice, one can choose passwords with sufficient entropy that they are not crackable by brute force. Or, to put it another way, in practice attackers are always limited in how many tries they can make, simply by the limited time available to them. I agree with the advice to use /dev/urandom instead of /dev/random, but the justification isn't right. | |
| Dec 11, 2010 at 20:59 | history | answered | Nakedible | CC BY-SA 2.5 |