regarding RNG, most implementations are actually PRNG which use an entropy source in combination with tricks like the modulus operator. if you know the seed of a PRNG it is deterministic. but the seed itself may or may not be random. secure cryptography may utilize other sources of randomness like mouse input, etc.
regarding RNG, most implementations are actually PRNG which use an entropy source in combination with tricks like the modulus operator. if you know the seed of a PRNG it is deterministic. but the seed itself may or may not be random. secure cryptography may utilize other sources of randomness like mouse input, etc.