David Honig writes:

 > you can think about using the bits.  You should hash them before use, to be
 > safer.  

Of course this assumes that the cryptohash doesn't introduce
exploitable hidden order. There should be a way to distill a physical
entropy source into an equal-probability sea of ones and zeroes
without using the algorithmic bottleneck.

Reply via email to