BBC: Website servers regularly use random numbers for encrypting data, but a flaw in how those numbers are generated could be exploited to expose the raw data. Bruce Potter, a security analyst, and Sasha Wood, a security researcher, found that a common random number generator used on Linux servers had a low level of entropy in the data stream it uses for generating the random numbers. That data stream is created by translating inputs such as mouse movements, key presses, and other machine actions into binary data and is stored in a pool. When a random number is needed, a chunk of that data is taken from the pool to seed the generator. The flaw that Potter and Wood found is that the servers are not getting enough input to have a high level of entropy in their data stream, which resulted in less randomness in the generated numbers. That means the encryption is more susceptible to guesses and brute force attacks.
The finding that the Saturnian moon may host layers of icy slush instead of a global ocean could change how planetary scientists think about other icy moons as well.
Modeling the shapes of tree branches, neurons, and blood vessels is a thorny problem, but researchers have just discovered that much of the math has already been done.
January 29, 2026 12:52 PM
Get PT in your inbox
PT The Week in Physics
A collection of PT's content from the previous week delivered every Monday.
One email per week
PT New Issue Alert
Be notified about the new issue with links to highlights and the full TOC.
One email per month
PT Webinars & White Papers
The latest webinars, white papers and other informational resources.