The answer is unknown and perhaps deliberate. Although it’s hard to be sure, the site seems to be a combination of charitable and nonprofit work. Each radio source generates only a few kilobytes of random data. As he describes this in many references, I see no evidence of CSRNG. It does not matter. For OTP purposes, if it is not truly random, this is an illustrious stream cipher. (I think Bruce and the others always talked.)
It’s hard for me to remember when a good CSRNG was broken. I would recommend using something like ISAAC or a properly implemented block / stream cipher. Perfect Paper Passwords does it. Use the Fortuna construct with Fortuna's internal components using the above ciphers / algorithms to get most of the random data. Fortuna can regularly enter TRNG data into it. The best TRNG for the budget is random.org plus locally generated stuff. The best low-cost hardware solution is the VIA Artigo board with VIA Padlock (TRNG + acceleration for SHA-1, SHA256, AES and RSA) for $ 300. They have libraries to help you use things. (There's even a pseudo-TRNG that uses processor time under network load.)
Remember that cryptography is usually the strongest link in the chain. System security exists at many levels: processor, firmware, peripheral firmware (esp DMA), kernel mode code, OS, trusted middleware or OS functions, application. Security generally includes users, policies, physical security, EMSEC, etc. Anyone who cares too much about RNG usually spends energy. Just use the decision made or something that I mentioned above. Then focus on the rest. Especially how people and systems interact. Configuration, correction, choice of OS, policies. Most problems happen there.
source share