|author||127.0.0.1 <127.0.0.1@web>||2016-11-28 23:06:00 +0100|
|committer||amnesia <email@example.com>||2016-11-28 23:06:00 +0100|
edited the problem part
1 files changed, 6 insertions, 7 deletions
diff --git a/wiki/src/blueprint/randomness_seeding.mdwn b/wiki/src/blueprint/randomness_seeding.mdwn
index 54d863f..28d4d87 100644
@@ -3,23 +3,22 @@
/dev/random and /dev/urandom are special Linux devices that provide access from
user land to the Linux kernel Pseudo Random Number Generator (PRNG). This
generator is used for almost every security protocol, like TLS/SSL key
-generation, choosing TCP sequence and file system and email encryption . In
-order to this seed to be cryptographically secure, a source with good amount of
+generation, choosing TCP sequences, ASLR offsets, and GPG key generation . In
+order for this seed to be cryptographically secure, a source with 'good'
entropy must be used. The Linux kernel collects entropy from several sources,
for example keyboard typing, mouse movement, among others.
Because of the Tails nature of being amnesic, and run from a (USB) live device,
-care must be taken to ensure the system still gets enough entropy through a
-random seed and the related daemons it ships.
+care must be taken to ensure the system still gets enough entropy and boots with enough randomness. For example by providing a random seed through different means.
-Althought this problem has been documented since a long time (see  and ),
-there's not so much LiveCD OSes out there that tackle it. Whonix has a [wiki
+Although these problem have been documented since a long time (see  and ),
+there's not much done to tackle the problem. We looked at notes and research from LiveCD OS's and supply them here for completements sake. Whonix has a [wiki
page](https://www.whonix.org/wiki/Dev/Entropy) with some notes, and Qubes has tickets
-Read ,, and  for more information.
+The Qubes tickets can be found at footnotes ,, and  for more information.
## Current situation