Comment by jandrewrogers
15 hours ago
In these kinds of systems the cryptographic components often aren't even accessible from the software. It isn't a thing you need to worry about.
This makes it easier to audit for use of entropy sources in the software since there really isn't a valid use case for it.
No comments yet
Contribute on Hacker News ↗