[whatwg] Cryptographically strong random numbers

On 22/02/2011, at 22:36, Brendan Eich wrote:
> (...)
> 
> However, Math.random is a source of bugs as Amit Klein has shown, and these can't all be fixed by using a better non-CS PRNG underneath Math.random and still decimating to an IEEE double in [0, 1]. The use-cases Klein explored need both a CS-PRNG and more bits, IIRC. Security experts should correct amateur-me if I'm mistaken.

.replace( /1]/gm, '1)' ) ?
-- 
Jorge.

Received on Tuesday, 22 February 2011 14:00:23 UTC