Roger A. said: I was thinking about this, and went back to confirm I was remembering the post about the testing of the dice correctly, but prior to quantum re-roll it sounds like the dice engine used the entropy from a "high quality server side entropy source" and then later in the thread it says that it also pulls as much randomness as it can from the users browser itself. If someone understood how the dice engine obtains the entropy from the browser itself, could they feed it bad info to corrupt the randomness of the dice? I don't know enough about this kind of thing to know how such a thing could be done, but I seem to recall reading something about the bad RNG's on some computers being used to affect the security of certain cryptographic functions by making the results more predictable.... I think it was something to do with the NSA, and don't know if that would even apply to something like the dice roller, but maybe a coder could weigh in on the possibility? The only reason I even mention it is I had a player who seemed to always get bad rolls, and one day he was having problems with his webcam so he turned it off. The rest of the session his rolls were much improved. I realize it was probably just random chance, and since his rolls went back to being lousy the next game even though he left the webcam off, I think we can say that probably wasn't it. But it did get me wondering about the gathering of entropy from the client machines. Prior to the quantum rolls, the dice roller was simply a good PRNG. (Better than the built-in random function.) I don't believe it's cryptographically secure, but that's lightyears beyond what's necessary to ensure the randomness of a die roll in a game for fun. As Aaron explains, spoofing the regular RNG is for all intents and purposes impossible. Spoofing quantum roll is harder. I can say with extreme confidence that your player turning off his webcam did nothing to affect the dice engine.