[ 3 / biz / cgl / ck / diy / fa / ic / jp / lit / sci / vr / vt ] [ index / top / reports ] [ become a patron ] [ status ]
2023-11: Warosu is now out of extended maintenance.

/biz/ - Business & Finance


View post   

File: 55 KB, 1083x654, quality.jpg [View same] [iqdb] [saucenao] [google]
49777298 No.49777298 [Reply] [Original]

Nice secure wallet you got there bro.

>> No.49777832

>>49777298
explain like me brainlot

>> No.49778244

>>49777298
y u no exploin?

>> No.49778310

>>49778244
It's source code of the Trezor Hardware wallet Firmware and there is literally written
>NOT SUITABLE FOR PRODUCTION USE: Replace random32() function with your own secure code

>> No.49778352

>>49778310
but y dey so dumb?

>> No.49778357

that's the test code not live

>> No.49778393

>>49777298
Damn you're stupid OP

>> No.49778403

>>49777832
Hardware wallets like trezor and ledger are for midwits, use a hot wallet and a cold paper wallet.

>> No.49778409

>>49778310
Code brainlet here, what about
> void random_reseed
can you reseed someone's wallet with no refunds?

>> No.49778528

>>49778409
Whatever that means the answer is obviously no.

>> No.49778535

>>49778310
>>49777298

Holy fuck, crypto peak buyers are fucking stupid. Its a function. It doesn't mean its used by anything in the code that needs cryptographically-secure random numbers. At least find where the function is used, if anywhere before you make a stupid post to show how retarded you are. So many dunning kruger fucking retards fomoed into this space last year.

>> No.49778614
File: 60 KB, 736x777, 1596542436.jpg [View same] [iqdb] [saucenao] [google]
49778614

>>49778535
ouch

>> No.49779034

>>49777832
the source code for the cryptography uses an in-built random number generator function which isn't very secure because it can be easily predicted and thus reversed engineered so it isn't secure and can be easily cracked, usually software that requires highly secure cryptography rely on more complex random number generators based on entropy (external temperature, cpu temperature, cursor movement, keyboard strokes or anything as 'random' as it gets etc)

https://www.redhat.com/en/blog/understanding-random-number-generators-and-their-limitations-linux#:~:text=A%20cryptographic%20algorithm%20(PRNG),a%20few%20true%20random%20bits.

>> No.49779182
File: 41 KB, 650x650, 1653679808435.jpg [View same] [iqdb] [saucenao] [google]
49779182

>>49777298
lol LCG usage + seed shown.
>LCGs are not intended, and must not be used, for cryptographic applications; use a cryptographically secure pseudorandom number generator for such applications.

Epic fail.

>> No.49779498

Cool, but is that function even used anywhere??

>> No.49780486

>>49778310
are you ok retard?

>> No.49780553

>>49779498
Yeah let's see where this function is called OP

>> No.49781021

>>49780553
It is used by function "random_buffer"
to generate seed for "secp256k1_context_randomize" which is not a big deal since it is only used to provide additional protection against side channel attacks, so quality of the seed it not critical.

>> No.49781066

>>49781021
Also used to generate random delays to, again, provide some protection against side channel attacks.
Basically OP is a fag.