Post
Topic
Board Bitcoin Discussion
Re: Does this still count?
by
satscraper
on 22/09/2023, 07:54:11 UTC
Depends on your setup. If you're using an air-gapped device that makes no use of random number generation, then the attacker can't take advantage of it to sign with insecure k-values (as an example). Transactions are signed using the RFC 6979 which doesn't generate random k-values. You would also need to use dice or coin to generate the entropy of your wallet. In that case, and by assuming the OS does not hide any backdoors for the specific type of wallet software you will use, then it's safe to assume you'll be fine.
I have always wondered what can affect the RNG and generating keys with enough entropy? For instance, do we know which hardware and software are always good sources of entropy and which aren't? Is there a list of models and versions that are specially good or bad? Also, can a good source of entropy suddenly go "bad" and generate insufficient entropy due to hardware defects or software misconfiguration?

I never gave it much thought.

These  are  very intriguing question which appeals to the imagination of many researchers in the field. NIST has developed the software set  that  "provides a standardized means of estimating the quality of a source of entropy." and almost each year organizes numerous workshops on this matter where you can find some answers. I would focused on     Random Bit Generation Workshop series and Entropy Source Validation Workshop, Just go to NIST site and search.