As in your example, the only source of entropy a network printer has: network data, easy to manipulate or even no activity. So no way to generate keys for example.
In some cases hardware sources are a must. Yes, in the end you'll need to trust them
As in your example, the only source of entropy a network printer has: network data, easy to manipulate or even no activity. So no way to generate keys for example.
In some cases hardware sources are a must. Yes, in the end you'll need to trust them