[squeak-dev] Seeding instances of Random
Chris Muller
asqueaker at gmail.com
Tue Nov 3 19:05:40 UTC 2015
> We can still use it to initalize the PRNG by using additional sources of
> entropy (image name, path, vm version, whatever). We can use SHA1 to get
> "more random" bits from out entropy sources. But this is more like a last
> resort than a solution to rely on.
I always thought a good list of hard-to-guess attributes injected in
sequence with SHA1 feedback should be sufficiently hard to guess.
millisecondClockValue, primUTCMicrosecondClock, timezone, Locale,
available memory, consumed memory, vmpath, localpath, Display extent,
Display imageForm, Sensor mouseX / mouseY, OS string,
millisecondsToRun this
I'm not against the new primitive idea, just have always been curious
about digital security..
More information about the Squeak-dev
mailing list
|