logoalt Hacker News

jandrewrogersyesterday at 8:18 PM0 repliesview on HN

In these kinds of systems the cryptographic components often aren't even accessible from the software. It isn't a thing you need to worry about.

This makes it easier to audit for use of entropy sources in the software since there really isn't a valid use case for it.