Closed
Description
The doc page for Crate rand features this note:
Note: on Linux, /dev/random is more secure than /dev/urandom, but it is a blocking RNG, and will wait until it has determined that it has collected enough entropy to fulfill a request for random data. It can be used with the Rng trait provided by this module by opening the file and passing it to reader::ReaderRng. Since it blocks, /dev/random should only be used to retrieve small amounts of randomness.
This is plain wrong.
Please see Daniel Bernstein in http://www.mail-archive.com/[email protected]/msg04763.html
For a cryptographer this doesn't even pass the laugh test.
or my own essay at http://www.2uo.de/myths-about-urandom/
The note should be removed without replacement.
Metadata
Metadata
Assignees
Labels
No labels