Okay, woot. I got the gathered random-enough entropy passing through some SHA-3 functions and into the Salsa20 stream cipher. Here is an example of the whole thing in action. Does this have crypto-level security? IDUNNOLOL! I would like to see somebody prove that it doesn't. That would be hard though.
Okay, woot. I got the gathered random-enough entropy passing through some SHA-3 functions and into the Salsa20 stream cipher. Here is an example of the whole thing in action. Does this have crypto-level security? IDUNNOLOL! I would like to see somebody prove that it doesn't. That would be hard though.