Skip to main content

Timeline for Feeding /dev/random entropy pool?

Current License: CC BY-SA 2.5

2 events
when toggle format what by license comment
Jan 17, 2011 at 5:48 comment added D.W. This answer is not accurate in practice, or is worded in a confusing way. In practice, one can choose passwords with sufficient entropy that they are not crackable by brute force. Or, to put it another way, in practice attackers are always limited in how many tries they can make, simply by the limited time available to them. I agree with the advice to use /dev/urandom instead of /dev/random, but the justification isn't right.
Dec 11, 2010 at 20:59 history answered Nakedible CC BY-SA 2.5