What does HackerNews think of rtl-entropy?
An entropy generator using SDR peripherals, including rtl-sdr and BladeRF
In actual reality, the generator won't be influenced, because it will require a strong signal, close by, likely transmitting illegally on the frequency you are listening to (of course, the attacker would need to know the frequency you're tuned to). Simple monitoring tools and scripts can be used to test the quality of the generator output. If the quality of the randomness begins to fail, as would happen with deliberate RF interference, then the script would stop outputting bits, and alert the administrator. Or, even better, switch to a different frequency, chosen at random by the kernel CSPRNG.
What's great about using the RTL-SDR as an RNG, is these devices are cheap (about $20) and can output 3 MiBps, which vastly out performs any USB HWRNG that I have personally tested for the value (bits per second per dollar).
FWIW, random.org uses RF noise as the basis for delivering random numbers to the Internet.
Anyway, FYI.
* http://blog.cros13.net/2014/08/cheap-entropy-using-your-rtl-...
* https://github.com/pwarren/rtl-entropy
In Go, potentially (using its native encryption library, possibly a worthy trade-off in terms of security and speed(0))
* https://github.com/jpoirier/gortlsdr
* https://github.com/porjo/hamsdr
1: https://github.com/pwarren/rtl-entropy
2: http://blog.cros13.net/2014/08/cheap-entropy-using-your-rtl-...
3: https://pthree.org/2015/06/16/hardware-rng-through-an-rtl-sd...
[0] https://github.com/pwarren/rtl-entropy
[1] https://www.gnu.org/software/hurd/user/tlecarrour/rng-tools....
You can get a $10 RTL-SDR [1] dongle that happily churns out over 2MSp/s and feed random radio noise to your entropy pool using rtl_entropy [2].
Also what's up with the flag, 'murica?