Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

"Truly random batches are not trivial to implement and any statistical pattern in the batching could be exploited."

If an HFT manages to exploit a correctly implemented entropy-pool random number generator using AES-256 to extend the stream as needed, they're welcome to pick up a few more bucks as far as I'm concerned.

Yes, problems have existed before but I'm sure in this case we can assume high-assurance and careful programming, not some fresh grad being assigned the problem and thinking linear congruential generators sound really cool.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: