[whatwg] Cryptographically strong random numbers

Jorge jorge at jorgechamorro.com
Tue Feb 22 14:00:23 PST 2011

On 22/02/2011, at 22:36, Brendan Eich wrote:
> (...)
> However, Math.random is a source of bugs as Amit Klein has shown, and these can't all be fixed by using a better non-CS PRNG underneath Math.random and still decimating to an IEEE double in [0, 1]. The use-cases Klein explored need both a CS-PRNG and more bits, IIRC. Security experts should correct amateur-me if I'm mistaken.

.replace( /1]/gm, '1)' ) ?

More information about the whatwg mailing list