1 |
On 25 Mar 2010 at 20:12, Rob Kendrick wrote: |
2 |
|
3 |
> On Thu, 25 Mar 2010 19:50:23 +0200 |
4 |
> pageexec@××××××××.hu wrote: |
5 |
> |
6 |
> > > it goes to extraordinary lengths to make sure the entropy that is |
7 |
> > > injected into your pool can't be sniffed before it gets there, |
8 |
> > |
9 |
> > out of curiosity, what's that mean exactly? |
10 |
> |
11 |
> That somebody with a few probes and a 50 quid USB logic analyser can't |
12 |
> capture the entropy that was delivered to the system. (One of the |
13 |
> target markets is installation in shared co-location facilities.) |
14 |
|
15 |
do they also protect against impersonation? from your other answers |
16 |
i infer that there's some (mutual?) authentication between the device |
17 |
and the kernel, so it should be possible ;). |