From 8e914a3a6001d0df4382f0b220c4157364f283f0 Mon Sep 17 00:00:00 2001 From: drduh Date: Mon, 12 Feb 2024 10:02:58 -0800 Subject: [PATCH] remove yubikey as rng --- README.md | 11 ----------- 1 file changed, 11 deletions(-) diff --git a/README.md b/README.md index 108c9fa..57a0912 100644 --- a/README.md +++ b/README.md @@ -20,7 +20,6 @@ To suggest an improvement, please send a pull request or open an [issue](https:/ * [macOS](#macos) * [Windows](#windows) - [Entropy](#entropy) - * [YubiKey](#yubikey) * [OneRNG](#onerng) - [Generate keys](#generate-keys) * [Temporary working directory](#temporary-working-directory) @@ -340,16 +339,6 @@ Most operating systems use software-based pseudorandom number generators or CPU- **Optional** A device such as [OneRNG](https://onerng.info/onerng/) may be used to [increase the speed](https://lwn.net/Articles/648550/) and possibly the quality of available entropy. -## YubiKey - -YubiKey version 5.2.3 introduced "Enhancements to OpenPGP 3.4 Support" which can gather additional entropy from YubiKey. - -To seed PRNG with an additional 512 bytes retrieved from the YubiKey: - -```console -echo "SCD RANDOM 512" | gpg-connect-agent | sudo tee /dev/random | hexdump -C -``` - ## OneRNG Configure [rng-tools](https://wiki.archlinux.org/title/Rng-tools):