I suggest that the next version (if ever there will be one) include a client that polls either
www.random.org or
www.lavarnd.org for a TRUE random number seed
Umm, why? If there is enough entropy available from the system for generating encryption keys, there is
more than enough for overwriting. Besides, if you download a bunch of random numbers from the web over an unencrypted connection, how is that better than using any other known data for seeding the generator?
Basically, random data from online sources might be good for statistical purposes, not necessarily for security.
if net access is unavailable for that system then it can fall back on the ISAAC method
Are you sure you have understood how the current PRNG works? ISAAC is
always used for generating the data used for overwriting, mostly because it is one of the fastest cryptographically strong PRNGs available. How the ISAAC is seeded is entirely another matter. Currently, Eraser uses a cryptographically strong PRNG quite similar in design to the one in the GNU Privacy Guard for seeding the ISAAC generator and shuffling the order of overwriting passes.
I know this will probably erupt into some kind of crypto flame war
You have to understand that the chain is only as strong as its weakest link, and the PRNG is not the weakest link here by any standard.
admin said:
It may actually be more secure to use the pattern of an existing dll or exe in the last passes
That's more like security through obscurity, no? I mean, it doesn't make it more difficult to recover the data, it is just done in hopes of fooling the attacker not to take a closer look.