Your own message can be left via the Contact page. All the comments below are very much appreciated and quoted verbatim.

Thoughts: Hi, from the crypto.stackexchange forum:

I finally added a non-linear component, take a look at:

Now I understand why, after reading: - Mr. X, 29 December, 2023.

We say: Thanks for taking the time to reach out to us. While secure cryptographic systems are tricky to properly implement, it’s vital that people try. Cryptographic Monoculturism farmed by the NSA is extremely dangerous - just ask any Irish potato farmer. We wish you luck.

“I like your site and ideas. But re Mata Hari kit - I guess it is just a fun thing, as of course the random numbers for encryption have to be known to both sender and receiver, and given to each secretly. Or does Mata Hari have a means of transmitting the random files to her base without being compromised?” - Anonymised, 4 July, 2022.

We say: It’s not for fun. We’re trying to sell Mata Hari kits to the CIA, but so far have had no response to our pitches. We can’t understand it. But as to transmission, we use the simple technique of thumb drives. When filling, the Cryptex application creates one time pads (OTPs) (in the Cryptex format) on a thumb drive. You do that twice on two drives and personally hand one to the other agent. OTPs can’t be transmitted at the same security level as themselves unless a quantum key distribution network is used. Unfortunately those are tricky for DIYers to build.

“Thank you. What oscilloscope used to read data please?” - Bhoja Jagachandra, 9 February, 2022.

We say: It’s a Rigol DS1054Z with the 100 MHz hack applied. Although any will do as the required bandwidth is < 1 MHz. You can even use an Arduino as an oscilloscope if you search on the Internet.

“Will OTP provide quantum resistance under 5 conditions?” - Anonymous, 13 August, 2020.

Our response is lengthy and in-lined, so has it’s own page.

“Hi can you set this to produce 2 digit sequences of 0 up to 99 and upto 69” - Ant, 20 July, 2020.

We say: The REALLYREALLYRANDOM devices are predominately networked entropy servers. That means their output is biased in some way. Perhaps even as biased as 30%. We can use these to produce perfectly uniformly distributed sequences of any number of digits, as long as a downstream randomness extractor is added.

“I like the steampunk look.” - Don M., 11 November, 2019.

“the ideas stupid. if you dont trust a random generator why trust your dc/dc reg. or your computer.” - X. E., 31 June, 2019.

We say: Well yes, DC-DC converters are pretty complex these days, and may even include a micro controller. But all they output is volts. Steady (hopefully) volts. You can prove this to yourself with a multimeter or in even greater detail with a cheap oscilloscope. And one of our core principles is using lots of volts. Typically 30V for a 24V Zener diode. So even if there are tiny NSA agents hiding inside your dc converter, their 100mV coded output is totally subsumed by the ~1V avalanche noise from the diode . Or use linear regulators if you want.

“This is one of the most valuable security sites on the Internet. Why is that? Whitfield Diffie said that if you can generate random numbers, you can have a private conversation. This gets straight to the point about what is really important in information security. This website is remarkable in that the author has the vision to see what is really important: for the end user to generate his or her own random numbers, and this is the basis for real security–passwords, symmetric keys, key passphrases, etc.” - Dave, 21 June, 2019.

We say: Ta