Entropy Ring Sources Examined
Chaos Entropy Pollinate Linux
Ubuntu cloud pollinators
"As can be seen there are still grand hopes of perfection, Sources can be purer..
Developments can surely be made to further improve the pool potential for RING Random/Chaos/Entropy sources
Further improvements to improve the future of cryptography are encouraged..
The signs are reliable progress will improve the system futures.
RS"
FIPS 140-2 successes: 1000 : 100% pure Chaos Rand : Ubuntu : perfectly random security : Updated
https://developers.cloudflare.com/argo-tunnel/reference/how-it-works/
/etc/cloudflared/config.yml
hostname: pollen-ub.n-helix.com
url: http://localhost
logfile: /var/log/cloudflared.log
compression-quality: 3
proxy-dns: true
proxy-dns-upstream:
- https://1.1.1.1/dns-query
- https://1.0.0.1/dns-query
proxy-dns-port: 53
autoupdate-freq: 6h
loglevel: debug
transport-loglevel: debug
https://github.com/dustinkirkland/pollinate
https://is.gd/Entropy
((100 bytes * 60) * 60) * 24 = 8.64 megabytes Rand per device ( Average is higher or lower than 100 )
21.3K+ Rand Entropy pollinate requests served in 12 hours average : #Pollinate #Ubuntu
AMD Ryzen & thread ripper have rand RNG/TPM units and are great pollinator nodes.
submit your pollinator nodes to security(at)ubuntu.com
use https://www.dynu.com/en-US/ to make a entropy.dyndns.net (for example) and send that to ubuntu security please.
Cryptographic Hardware RAND sources
"Why not Cloud providers like IBM, Amazon & google for RAND, Entropy .. Cryptographic TPM Hardware RND with great PRNG to improve security?
Cloud Providers are a most excellent source for Chaotic Entropy & provide true random chaotic sources for cryptographic ready RAND,
Additionally they provide most excellent resources to further the expansion of internet intellectual property.
By providing additional sources to the support at https://ubuntu.com the merits of expanding the data pool for linux research rand expound upon the needs of the many,
Requiring few manual regulatory examinations to certify the unlikely events leading to system insecurities or predictability,
The systems will be majorly improved on the factors of reliability & community drive.
By Creating the system that secures the internet Linux Ubuntu creates a key new market in the world of cyber security, Further forwards the science of Matter; Physics and Gaming,
Nexgen code has no barriers for greater utilisation of surprise & the fact we no longer have a clue what gaming plots really contain or what dynamic system flow will show about the efficiency and function of our technology..
Chaotic entropy enables the mapping of weather; Engine gas & other viscus fluid, liquid, gas and materials..
Secure internet & Enhanced cyclic butterfly effect creations, Research, Gaming.. Design & utility.
With this Chaotic Entropy & life expanding rand we will be able to do so much..
Thanks to Debian sourced linux distributions like Ubuntu we are able to produce..
100% certified chaos for research,Science,Engineering, Security & Gaming / Lotto / Casino Royal events..
Totally life changing.
RS"
"Why not Cloud providers like IBM, Amazon & google for RAND, Entropy .. Cryptographic TPM Hardware RND with great PRNG to improve security?
Cloud Providers are a most excellent source for Chaotic Entropy & provide true random chaotic sources for cryptographic ready RAND,
Additionally they provide most excellent resources to further the expansion of internet intellectual property.
By providing additional sources to the support at https://ubuntu.com the merits of expanding the data pool for linux research rand expound upon the needs of the many,
Requiring few manual regulatory examinations to certify the unlikely events leading to system insecurities or predictability,
The systems will be majorly improved on the factors of reliability & community drive.
By Creating the system that secures the internet Linux Ubuntu creates a key new market in the world of cyber security, Further forwards the science of Matter; Physics and Gaming,
Nexgen code has no barriers for greater utilisation of surprise & the fact we no longer have a clue what gaming plots really contain or what dynamic system flow will show about the efficiency and function of our technology..
Chaotic entropy enables the mapping of weather; Engine gas & other viscus fluid, liquid, gas and materials..
Secure internet & Enhanced cyclic butterfly effect creations, Research, Gaming.. Design & utility.
With this Chaotic Entropy & life expanding rand we will be able to do so much..
Thanks to Debian sourced linux distributions like Ubuntu we are able to produce..
100% certified chaos for research,Science,Engineering, Security & Gaming / Lotto / Casino Royal events..
Totally life changing.
*sources*
https://pollinate.n-helix.com/https://pollinate2.n-helix.com/
https://entropy.n-helix.com/
https://entropy2.n-helix.com/
*science*
https://science.n-helix.com/2017/04/rng-and-random-web.html****Statistics****
Delivery speed RND Pollinate : #Securityhttps://drive.google.com/open?id=178nvBqjBc_YOeKvavL32TNO_iNdlqNlN
AT Defence Plans
https://photos.app.goo.gl/reg3tkyhEV32P3NL9
https://drive.google.com/open?id=1iHSiZiRKgqxZF2akFFkvCthn1vTiYrsL
**** Statistics****
https://drive.google.com/open?id=1KKH_ejyWrjUnhZ0qp7swCjOaqGJs_FnRhttps://drive.google.com/open?id=1O-HGjwxEZsQKwX_XWUKcbDj78zP-1r3Q
https://drive.google.com/open?id=1KKFjVyh73sn6IE9r5R6CH-iZp39R8LHU
https://drive.google.com/open?id=1TLPbbbcqaDTt2Ly1yb_uUXj6pK6XN4dJ
https://drive.google.com/open?id=1gOey570yjGBMcumCHCPTnt5iCeOCh7Y8
https://drive.google.com/open?id=1ZhVrsNdKmhlZ-dvqtnqyY5FuaQ9jLmxH
https://drive.google.com/open?id=1aD0OGlj_-lAlcGOcn3Z9jDPRo9kVHxFy
https://drive.google.com/open?id=1dGuG28cINIGhNHnvVkBLMmYMdmMgxDNp
https://drive.google.com/open?id=1284DyzPsQg1cac6KzFQvqJswPlFHNnpR
https://drive.google.com/open?id=1MGUavUApGQ6V6yDWEeI013hBnVShVetq
https://drive.google.com/open?id=1oFTqZPmdhtQmWw1NjigENrP5iCOW6lrs
https://drive.google.com/open?id=1w-HuYEN1gqvGWfkXQhDKu3JUKKnkLYrP
https://drive.google.com/open?id=1QFdb019lQ6PeFLAgNwv-VBVJoPOg7CyB
https://drive.google.com/open?id=1MQwLIC03ojKlMhxiqvS-Dm3pz-LHaiiV
https://drive.google.com/open?id=1cJkzc3_LQcLefopy7yyiLlLOH46bb-j9
https://drive.google.com/open?id=1j2KhSMGg0Pza77d0QDRn-XwV846Ob5ft
https://drive.google.com/open?id=1s6p5kE9ZZHduaNgjoVa5GpA4WFJXfbJH
https://drive.google.com/open?id=1y-gkCY0ZwKt-rp82ReSUAFhnlQJWyuCV
FIPS Records 2019-01-07
https://drive.google.com/open?id=1E8gxUN0NfmDGNT-eDK46sREySUrBlP67**** Statistics****
sonex-reg@n-helix-com:~$ cat /proc/sys/kernel/random/entropy_avail
3555
sonex-reg@n-helix-com:~$ cat /dev/random | rngtest -c 40000
rngtest 5
Copyright (c) 2004 by Henrique de Moraes Holschuh
rngtest: starting FIPS tests...
rngtest: bits received from input: 800000032
rngtest: FIPS 140-2 successes: 39965
rngtest: FIPS 140-2 failures: 35
rngtest: FIPS 140-2(2001-10-10) Monobit: 4
rngtest: FIPS 140-2(2001-10-10) Poker: 1
rngtest: FIPS 140-2(2001-10-10) Runs: 11
rngtest: FIPS 140-2(2001-10-10) Long run: 19
rngtest: FIPS 140-2(2001-10-10) Continuous run: 0
rngtest: input channel speed: (min=959.531; avg=14970.406; max=19531250.000)Kibits/s
rngtest: FIPS tests speed: (min=1.630; avg=82.952; max=161.640)Mibits/s
rngtest: Program run time: 61397903 microseconds
sonex-reg@n-helix-com:~$ cat /proc/sys/kernel/random/entropy_avail
3193
sonex-reg@n-helix-com:~$ top -c
top - 21:00:44 up 21:01, 1 user, load average: 3,07, 3,23, 5,04
Tasks: 325 total, 1 running, 245 sleeping, 0 stopped, 1 zombie
%Cpu(s): 10,8 us, 1,5 sy, 0,0 ni, 87,4 id, 0,1 wa, 0,0 hi, 0,2 si, 0,0 st
KiB Mem : 24691920 total, 12718944 free, 8498344 used, 3474632 buff/cache
KiB Swap: 41921548 total, 41921548 free, 0 used. 15723984 avail Mem
A cascade of mono-bit shredders ... and long runs show considerable thought is required for RND development.
**
3545
sonex-reg@n-helix-com:~$ cat /dev/random | rngtest -c 25000
rngtest 5
Copyright (c) 2004 by Henrique de Moraes Holschuh
rngtest: starting FIPS tests...
rngtest: bits received from input: 500000032
rngtest: FIPS 140-2 successes: 24981
rngtest: FIPS 140-2 failures: 19
rngtest: FIPS 140-2(2001-10-10) Monobit: 2
rngtest: FIPS 140-2(2001-10-10) Poker: 3
rngtest: FIPS 140-2(2001-10-10) Runs: 5
rngtest: FIPS 140-2(2001-10-10) Long run: 9
rngtest: FIPS 140-2(2001-10-10) Continuous run: 0
rngtest: input channel speed: (min=1.117; avg=14.647; max=19073.486)Mibits/s
rngtest: FIPS tests speed: (min=3.604; avg=81.979; max=161.640)Mibits/s
rngtest: Program run time: 38381555 microseconds
sonex-reg@n-helix-com:~$ cat /proc/sys/kernel/random/entropy_avail
3146
sonex-reg@n-helix-com:~$ top -c
top - 09:54:44 up 13:35, 1 user, load average: 3,79, 3,78, 3,21
Tasks: 359 total, 1 running, 280 sleeping, 0 stopped, 1 zombie
%Cpu(s): 8,9 us, 2,4 sy, 0,0 ni, 83,0 id, 5,6 wa, 0,0 hi, 0,1 si, 0,0 st
KiB Mem : 24691920 total, 9494520 free, 10551780 used, 4645620 buff/cache
KiB Swap: 41921548 total, 41921548 free, 0 used. 13641316 avail Mem
sonex-reg@n-helix-com:~$ cat /proc/sys/kernel/random/entropy_avail
3477
sonex-reg@n-helix-com:~$ cat /dev/random | rngtest -c 40000
rngtest 5
Copyright (c) 2004 by Henrique de Moraes Holschuh
rngtest: starting FIPS tests...
rngtest: bits received from input: 800000032
rngtest: FIPS 140-2 successes: 39975
rngtest: FIPS 140-2 failures: 25
rngtest: FIPS 140-2(2001-10-10) Monobit: 0
rngtest: FIPS 140-2(2001-10-10) Poker: 7
rngtest: FIPS 140-2(2001-10-10) Runs: 11
rngtest: FIPS 140-2(2001-10-10) Long run: 7
rngtest: FIPS 140-2(2001-10-10) Continuous run: 0
rngtest: input channel speed: (min=1.075; avg=14.661; max=19073.486)Mibits/s
rngtest: FIPS tests speed: (min=5.699; avg=78.753; max=160.281)Mibits/s
rngtest: Program run time: 61738871 microseconds
sonex-reg@n-helix-com:~$ cat /proc/sys/kernel/random/entropy_avail
3211
sonex-reg@n-helix-com:~$ top -c
top - 17:08:56 up 1 day, 16:42, 1 user, load average: 5,08, 5,28, 4,39
Tasks: 383 total, 1 running, 304 sleeping, 0 stopped, 2 zombie
%Cpu(s): 10,4 us, 2,4 sy, 0,0 ni, 81,2 id, 5,9 wa, 0,0 hi, 0,1 si, 0,0 st
KiB Mem : 24691920 total, 939216 free, 19678264 used, 4074440 buff/cache
KiB Swap: 41921548 total, 41921548 free, 0 used. 4331756 avail Mem
sonex-reg@n-helix-com:~$ cat /proc/sys/kernel/random/entropy_avail
3519
sonex-reg@n-helix-com:~$ cat /dev/random | rngtest -c 1000
rngtest 5
Copyright (c) 2004 by Henrique de Moraes Holschuh
rngtest: starting FIPS tests...
rngtest: bits received from input: 20000032
rngtest: FIPS 140-2 successes: 1000
rngtest: FIPS 140-2 failures: 0
rngtest: FIPS 140-2(2001-10-10) Monobit: 0
rngtest: FIPS 140-2(2001-10-10) Poker: 0
rngtest: FIPS 140-2(2001-10-10) Runs: 0
rngtest: FIPS 140-2(2001-10-10) Long run: 0
rngtest: FIPS 140-2(2001-10-10) Continuous run: 0
rngtest: input channel speed: (min=990.378; avg=15237.623; max=19531250.000)Kibits/s
rngtest: FIPS tests speed: (min=40.930; avg=75.822; max=145.599)Mibits/s
rngtest: Program run time: 1533851 microseconds
sonex-reg@n-helix-com:~$ cat /proc/sys/kernel/random/entropy_avail
3157
sonex-reg@n-helix-com:~$ top -c
top - 20:03:59 up 19:37, 1 user, load average: 1,53, 2,33, 2,57
Tasks: 378 total, 2 running, 294 sleeping, 0 stopped, 2 zombie
%Cpu(s): 10,6 us, 2,5 sy, 0,0 ni, 81,3 id, 5,5 wa, 0,0 hi, 0,1 si, 0,0 st
KiB Mem : 24691920 total, 6488632 free, 14951916 used, 3251372 buff/cache
KiB Swap: 41921548 total, 41921548 free, 0 used. 9183856 avail Mem
****
sonex-reg@n-helix-com:~$ cat /proc/sys/kernel/random/entropy_avail
3617
sonex-reg@n-helix-com:~$ cat /dev/random | rngtest -c 1000
rngtest 5
Copyright (c) 2004 by Henrique de Moraes Holschuh
rngtest: starting FIPS tests...
rngtest: bits received from input: 20000032
rngtest: FIPS 140-2 successes: 1000
rngtest: FIPS 140-2 failures: 0
rngtest: FIPS 140-2(2001-10-10) Monobit: 0
rngtest: FIPS 140-2(2001-10-10) Poker: 0
rngtest: FIPS 140-2(2001-10-10) Runs: 0
rngtest: FIPS 140-2(2001-10-10) Long run: 0
rngtest: FIPS 140-2(2001-10-10) Continuous run: 0
rngtest: input channel speed: (min=303.861; avg=15125.460; max=9765625.000)Kibits/s
rngtest: FIPS tests speed: (min=24.328; avg=63.635; max=145.599)Mibits/s
rngtest: Program run time: 1591605 microseconds
sonex-reg@n-helix-com:~$ top -c
top - 14:12:57 up 1 day, 13:59, 1 user, load average: 3,32, 3,57, 3,56
Tasks: 415 total, 3 running, 332 sleeping, 0 stopped, 1 zombie
%Cpu(s): 14,2 us, 3,4 sy, 0,0 ni, 81,5 id, 0,7 wa, 0,0 hi, 0,2 si, 0,0 st
KiB Mem : 16434388 total, 355552 free, 13389264 used, 2689572 buff/cache
KiB Swap: 41921548 total, 40637708 free, 1283840 used. 1393852 avail Mem
Rupert S
No comments:
Post a Comment