>>4209>Also concerning /dev/urandom: It's not truly random of course and we're trusting that our CPU is actually doing what we're telling it. Which in modern times it probably isn't. But we have to work with what we've got.I can't find source right now (phoneposting) but Intel's RDRAND instruction was intentionally screwed with by orders of the US government. Its not a reliable source of entropy.
However, the /dev/random special file uses many other sources of entropy and thus can be considered fairly secure.
In case of hard drives, I'd say its more than enough. They probably wanted RDRAND compromised so they could break encryption more easily. If you're writing random data to a hard drive, that one block of data that "isn't as random" shouldn't pose you any threat
> Most of those people try really hard to snoop around your storage to find anything of value. Since they'd much rather drain your ATM for $2k+ and get a big score instead of simply making $100-$200 off a computer they spent hours wiping then re-installing Windows onI always thought these were two, mutually exclusive sets of thieves. The kind of thievery where you just nick a laptop and sell it to a shady shop, and the kind where you try to log into peoples accounts and steal their money are very different and require different skill sets. A theif will do what's least likely to get him caught, right? But you're right, I wouldn't want any of my data accessed by thieves.
>So your main concern is avoiding the script kiddies which is pretty easyEven basic encryption with a strong password is going to get 99% of attackers off your back, unless you're being targeted. TPMs aren't foolproof, BIOS things aren't foolproof (read about Toshiba using the exact same encryption keys from 2004), so a determined and skilled attacker could still potentially get in. You should use a good password, I met a guy who turned on his work laptop, and the Bitlocker password was just a number. It was long, sure, but any autist with a powerful graphics card can crack a numeric password in a couple of days at most.
Then he tells me all his work laptops only have numeric passwords for bitlocker.