Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Australian National University generates a random bit stream by measuring the quantum fluctuations of the vacuum. http://qrng.anu.edu.au/index.php A few years ago I created a F# .NET library to consume this stream in varying ways. https://jackfoxy.github.io/RandomBits/


The fatal flaw of course is that everyone accessing their stream gets the same random data, making it substantially less random in the sense of others not being able to predict it. So do not use for cryptography!


They're not very explicit, but their FAQ indicates that they are buffering random data and they sometimes even turn the generators off. Which would suggest that they're not repeating the same random data to multiple users

Interestingly most clues about how their system work are given in the 'paranormal' section of their FAQ on https://www.random.org/faq/


I'm not a crypto expert. But I do know this stream is a firehose. Somewhere on the site is says how much data is generated. I forget. Naively I would think at least for some applications there would be no way to determine what part of the stream had been sampled. And the stream connection is over https.


> there would be no way to determine what part of the stream had been sampled

So the problem become to determine the offset of the stream you looked at, which is an integer that probably fits in 64 bits.


I use it for my passwords and I have a icon on my iPhone to get to it quick




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: