paint-brush
Randomness and Entropy in Node and Electronby@wagslane
889 reads
889 reads

Randomness and Entropy in Node and Electron

by Lane Wagner2mFebruary 29th, 2020
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Most functions that generate randomness are not considered cryptographically secure. That means that an attacker can take a good guess at what number a non-secure randomness generator generated. Strong pseudo-randomness (or entropy) generators are not guessable by an attacker. A software-only system like Qvault can at best generate strong pseudo random data because we are working on deterministic systems. If you need a random number within a range of 0-9, then use non-biased function that uses crypto.randombytes() as the source of entropy.

People Mentioned

Mention Thumbnail

Company Mentioned

Mention Thumbnail
featured image - Randomness and Entropy in Node and Electron
Lane Wagner HackerNoon profile picture
Lane Wagner

Lane Wagner

@wagslane

Founder of Boot.dev. Whining about coding sins since 2011. Committing coding sins for the same.

About @wagslane
LEARN MORE ABOUT @WAGSLANE'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

Lane Wagner HackerNoon profile picture
Lane Wagner@wagslane
Founder of Boot.dev. Whining about coding sins since 2011. Committing coding sins for the same.

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Also published here