Author Archive

Can Computers Generate True Random Numbers?

Why does this matter for security? Randomness is the backbone of cryptographic security, yet most systems still rely on software-based randomness. This video does a great job breaking down why true random number generation matters—and how computers often fall short. If you’re navigating post-quantum readiness or securing edge devices, understanding the difference between PRNG and…

Read More

Introduction to Hardware Random Number Generators

In this video, Asa Graf explains what hardware random number generators (HRNGs) are, how they work, and why they’re critical to generating real entropy. Unlike software-based methods, HRNGs rely on unpredictable physical processes—such as thermal noise or electrical fluctuations—to create truly random values. These values form the cryptographic foundation of secure systems. Watch the video…

Read More

NMCS4ALL: Random number generators

This educational video—produced with support from the National Science Foundation—offers a clear, beginner-friendly introduction to random number generation. It explains the difference between true randomness and pseudorandomness, using real-world demos to illustrate why the distinction matters in everything from science to cybersecurity. Watch a video published by Dave Ackley’s YouTube channel about randomness and pseudorandom…

Read More

Random Number Generator Seed Source

This video dives into the inner workings of random number generators (RNGs), focusing on how microcontrollers create seed values. These seeds are the foundation of randomness in both pseudo and true RNGs. If the seed isn’t truly unpredictable, the entire encryption system may be compromised. Watch a video originally posted by 0033mer YouTube channel showing…

Read More

Random vs. Pseudorandom Number Generators

Randomness plays a critical role in everything from cryptography to simulations. But not all randomness is created equal. This video dives into the difference between true and pseudorandom number generators, including how the Neumann algorithm works and why “periods” in pseudorandom sequences create predictability that weakens security. Real Random uses tamper-evident hardware to harness Brownian…

Read More

Fraud Prevention in Ecommerce Report 2021/2022 – Securing Ecommerce for Quantum Computing

Read Doug Hill’s take on securing Ecommerce for the new era of quantum computing. The Fraud Prevention in Ecommerce Report 2021/2022 is the ultimate source of knowledge that delves into the evolutionary trail of the payments fraud ecosystem, revealing the most effective security methods for businesses to win the battle against bad actors. Original Source: The…

Read More

Critical Infrastructure Protection: Fixing Serial Number Flaws

Updated: 8/4/2025 Summary The SSL Store’s blog Why All the Fuss About 64-Bit Serial Numbers details a recent issue where millions of digital certificates were revoked due to non-compliant serial numbers.  A misconfiguration in the EJBCA software reduced certificate serial number entropy from 64 to 63 bits, violating CA/B Forum requirements.  While not an immediate…

Read More