this site has two programmers

 

dorky femme droid

eggbug enthusiast

important eggbug lore

 


 

if you use the phrase "be normal" as if it's something to aspire to, kindly take a long walk off a short plank. or block me. whichever is easier for you.

 


 

child of the 80s

 


 

i escaped a cult.
all of the content warnings.
all of them.
tag: exerian's tragic backstory

 


 

                                 
eggbug bounce 88x31An 88x31 button advertising Cohost: "no ads. no tracking. yes eggbug."get firefox
   
                                                       
  

Dex
@Dex

people theorize about the possibility of using keysmashes to generate secure passwords

however, how cryptographically secure is a good keysmash? in this essay i will


kda
@kda

probably pretty bad?

Keysmashes are often really predictable, and you can totally narrow down the range of keysmashes that one might produce based on what keyboard they're using (some keyboards can't handle n arbitrary keystrokes simultaneously, and will disregard some of them!), what keyboard layout they're using, how they learned to type, factors that might influence how they move their fingers in repetitive fashions, so on so forth.

Like, they're pretty random, but it's a fairly constrained kind of randomness.


Cariad
@Cariad

No. Key smashes are a bad idea to generate random passwords. They're entirely predictable. Maybe if I am bored and have the time, I will demonstrate the entropy levels given from key smashing.


SomeEgrets
@SomeEgrets

*keysmashes in bird*

(it's just "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa")


You must log in to comment.

in reply to @Cariad's post:

I remember in Cryptonomicon they used the timing of keysmashes as an independent source of entropy for generating a key. Would that be viable or is there still hardware-level un-randoming?