Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Optionally disable system RNG #5

Open
jasondavies opened this issue Feb 10, 2018 · 0 comments
Open

Optionally disable system RNG #5

jasondavies opened this issue Feb 10, 2018 · 0 comments

Comments

@jasondavies
Copy link

In order to make it easier for participants to follow "Eliminating the possibility of backdoors with high probability", it would be good if the system RNG could be disabled so that only user-provided entropy is used.

The user would then be able to record the input entropy in randomly-chosen N-1 of N compute runs and verify that no tampering took place using alternative software and environments.

Something like --disable-rng or --without-rng?

Since measuring entropy is kind of difficult/onerous, I'm tempted to say that only the most basic checks should be used (number of input characters), and leave the rest up to the user?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant