Quote from: Shannon on September 18, 2012, 03:27 ami imagine that once you let gpg get greedy with the secmem the limiting factor will be your entropy pool/dev/random is better than /dev/urandom but it's slow and werner says that even /dev/random might not provide enough entropy estimation. oh well :( i guess you can make it faster by piping your ethernet card into rndcontrol and downloading a bunch of porn or by doing something hackish like "rngd r /dev/urandom;find /usr /var /tmp /opt -type f -print0 | xargs -0 cat > /dev/null"Once you have to start worrying about whether or not the entropy pool is solid enough during each key generation then you really have to question whether or not there is any practical value in generating asymmetric keys larger than 4K or even 8K.The reality is that if a 4K key isn't enough for whatever you're doing then you're in much deeper shit than this place is ever likely to attract and the vectors of attack used against you will be very different than simply attempting to crack your messages.Still, people wanted to know how to do this and it didn't take long to write. ;)