What is Quantum Entropy?
The universe has a secret: at the quantum level, nature is genuinely,
fundamentally unpredictable. True Entropy harnesses that unpredictability
to protect your digital life.
The Problem
Why ordinary random numbers are dangerous
Every password,
key, and token your devices generate today comes from a
mathematical formula — a pseudorandom number generator (PRNG).
Given the same starting seed, a PRNG produces the same sequence every time.
It is not truly random. It is a pattern.
Attackers who can predict or reconstruct your PRNG seed can predict every
key you have ever generated. This is not theoretical — it has broken
real-world encryption systems, stolen cryptocurrency, and exposed
governments and banks.
Check if your current passwords are already in a breach database →
The Science
Where quantum randomness comes from
Quantum mechanics — the physics of the very small — describes a universe
where certain events have no cause. They simply happen, with a probability
but never a predetermined outcome. This is not a limitation of our knowledge.
It is a fundamental property of reality, confirmed by over a century of
experiments.
When a photon (a particle of light) hits a camera sensor, the exact number
of electrons released is governed by quantum chance. Frame to frame, pixel
to pixel, the variation is real noise — not mathematical noise.
No computer, no algorithm, no attacker can predict it.
Types
Types of quantum random number generation
-
⚡
Photon shot noise (ours)
Camera sensor captures laser light. Quantum uncertainty in photon arrival
creates frame-to-frame variation. Simple, cheap, fast.
-
🔬
Optical vacuum fluctuations
Measures quantum vacuum noise using homodyne detection.
Used by ANU QRNG. Requires laboratory optics.
-
⚛️
Radioactive decay
Detects random decay events from a radioactive source.
Used by HotBits. Requires a Geiger counter.
-
🌊
Bell inequality / entanglement
Uses quantum entanglement to certify randomness.
Gold standard. Requires quantum computers or lab setups.
-
📡
Atmospheric noise
Measures radio noise from lightning strikes.
Used by Random.org. Not quantum — classical physical noise.
Our Method
How True Entropy generates your numbers
1
Laser source
A laser illuminates the camera sensor continuously.
High photon flux means high shot noise — more quantum uncertainty per pixel.
2
Frame differencing
Two consecutive frames are subtracted. Fixed sensor noise
cancels out. Only the quantum shot noise remains.
3
LSB extraction
The least significant bits of each pixel difference
carry the most noise — the most quantum randomness per bit.
4
Von Neumann debias
A mathematical extractor removes any remaining statistical
bias. Bit pairs (0,1)→0, (1,0)→1, identical pairs discarded.
Output is perfectly balanced.
5
SHA-256 conditioning
Final whitening pass per NIST SP 800-90B. Ensures
uniform distribution across all output values. Industry standard.
6
Entropy pool
Conditioned entropy is stored in the
entropy pool
and served on demand. Enable
Node Mode
to share it with every device on your network.
Node Mode
Using your phone as an entropy node
When Node Mode is active,
this device becomes a quantum entropy server for every device on your network —
laptops, IoT, smart TVs, routers. Any device can request entropy at
http://[phone-ip]:8080/entropy.
Your phone caches a
local pool of quantum entropy.
If it loses connection to the True Entropy source, it continues serving
from its cache — maintaining security even in offline or emergency scenarios.
Run node_forwarder.py via Termux to activate the local entropy server.
Why It Matters
Post-quantum cryptography and the future
NIST has standardised the first post-quantum cryptographic algorithms
(FIPS 203, 204, 205 — published 2024). These algorithms are designed to
resist attacks from quantum computers. But they still require high-quality
classical randomness for
key generation.
A world with quantum computers is a world where PRNG-generated keys
become increasingly vulnerable. True Entropy prepares you for that world
today: hardware that generates real quantum randomness, locally, with no
cloud dependency, no data leakage, and no single point of failure.
Harden this device with PQC key material →
Check your passwords for breaches →
See the verified security tool stack →