Bitcoin Forum
May 06, 2024, 09:51:37 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 [2]  All
  Print  
Author Topic: Is my method a secure way to gather entropy?  (Read 2113 times)
profitgenerator212 (OP)
Sr. Member
****
Offline Offline

Activity: 714
Merit: 251



View Profile
February 16, 2017, 10:48:59 PM
 #21


This can't be emphasized enough. The OP's fancy scheme is just a few more bits of key material (which they've now made public). Real attackers search not just over the words but over the methods, and this scheme has added little to no actual entropy-- it has just added complexity and serious additional leak risks.  It is the worst kind of security theater.

Unfortunately, I've found that when someone has gone down this rabbit hole they often become addicted to the complexity of their ritual-- like move "conspiracy wall"-- they weave together steps which don't help and sometimes hurt their security, but are unshakably convinced that it is the most secure method ever.  ... I've given up trying to convince them otherwise... but I comment so that someone who comes across this stuff with a spotless mind will not gain the impression that people think it is good it isn't.



Ok I understand. I am not conspiracy minded, I just wanted a straight answer to my problem. I believe I have it now. Thanks for all the inputs.


                            █████
                        █████████████
                     █████████████
                 ██████████████        █████
              █████████████        ████████████
          ██████████████        █████████████
       █████████████        █████████████       ██████
       ██████████        ████████████           ██████
       ███████       █████████████       ███    ██████
       ███████    █████████████       ██████    ██████
       ████████████████████       ██████████    ██████
       █████████████████       █████████████    ██████
       █████████████       █████████████        ██████
       ██████████       █████████████           ██████
       ███████      ██████████████       ███    ██████
       ██████    █████████████       ███████    ██████
       ██████    ██████████       ██████████    ██████
       ██████    ██████        █████████████    ██████
       ██████    ███       █████████████        ██████
       ██████           █████████████       ██████████
       ██████       █████████████        █████████████
                 █████████████       █████████████
              ████████████        █████████████
                  ████         ████████████
                           █████████████
                         ███████████
                            █████
Ferrum Network • Interoperability Network for Financial Applications
Pages: « 1 [2]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!