“…Nevertheless, old log entries can't be modified and stay secure, because a CSPRNG withstands state compromise extensions. There are many real-world physical attacks on memory that enable an attacker to gain access to the random number generator by memory leakage or side channels (Akavia et al, 2009;Chari et al, 2010). To avoid this problem, a random generator implemented in hardware can be used.…”