[whatwg] Cryptographically strong random numbers
jorge at jorgechamorro.com
Tue Feb 22 14:00:23 PST 2011
On 22/02/2011, at 22:36, Brendan Eich wrote:
> However, Math.random is a source of bugs as Amit Klein has shown, and these can't all be fixed by using a better non-CS PRNG underneath Math.random and still decimating to an IEEE double in [0, 1]. The use-cases Klein explored need both a CS-PRNG and more bits, IIRC. Security experts should correct amateur-me if I'm mistaken.
.replace( /1]/gm, '1)' ) ?
More information about the es-discuss