|
November 12, 2022, 01:44:13 PM |
|
#here /dev/random uses the onerng usb random generator to get the seed e=$(cat /proc/sys/kernel/random/entropy_avail) h=$( head -c $e /dev/random | sha3sum -b -a 256 | awk '{print $1}' ); echo $h echo '/dev/random from onerng'
ok, here assumes you have a ONERNG-USB ($40USD) or equiv plugged into a linux hw box
Note here in bash ( if u can't read bash then go away ), where is is the N, of significant non-recurring random bits from device normal should be about 3k but so what we only need 256 bits for a key ( private bit coin key )
Here 'h' is the key, note that where 'e' gets the Number of entropy, we only clip off that top N for the 'hash'
Note I'm NOT using sha256, I'm using keccak 3, which is RUSSIA, sha256 & ecdlp-256kp1 are NSA all 100% of bitcoin is NSA, which means they have back doors
So by not using SHA to has the random bits, you ensure that NSA can't backdoor your generated addresses ( know this in stone bitches )
The problem is that all random number generation on linux dist are now compromised;
Sure the HW USB device is simple, an avalanche diode an A2D convert and a FTDI chip, if you buy know HW if there is CPU then your are FUCKED; KISS folks, keep it simple stupid
There is tons of software on linux to measure 'entropy' of your device, certainly your generated device should generate 10x non-recurring entropy over target.
I will say one last time, KECCAK-512-3 is RUSSIAN the Sha256 which is based on BTC is NSA, like ECDLP256kp1 all are NSA
Not since 1950's has NSA ever released or mandated an ALGO, where they did not have backdoor KEYS, FACT
ENJOY; Using electrum or any wallet, and preferrably you should be running your own private electrum-server for anonymity, you can import your key and gen addressses and do as you wish;
If you don't understand the above, then find a mentor, but for gods sake don't use 3rd party software and don't use this shit while your connected online, its assumed your using a disconnected dinosaur computer with no access to internet
regarding your HW avalanche diode device, this is the kind of stuff we made when we were 8 years old in the day electronics, certainly if you don't roll your own, if you can't read a schematic, if you don't know for sure that your device is not compromised, then you are fucked.
|