source: https://www.securityfocus.com/bid/44952/info WebKit is prone to a random-number-generator weakness. Attackers can exploit this issue by enticing an unsuspecting user into visiting a malicious webpage. Successful attacks will allow attackers to track user sessions and obtain personal information that can aid in further attacks. NOTE: This issue was previously covered in BID 44938 (Apple Safari Prior to 5.0.3 and 4.1.3 Multiple Security Vulnerabilities) but has been given its own record to better document it.

Polling interval:
Use low values (e.g. 200) for PRNG state mark demo and reseed counting
Use high values (e.g. 5000) for PRNG prediction demo

Total MSVCRT PRNG invocations (since this page load):

MSVCRT PRNG invocations since last reseed:

MSVCRT PRNG reseed count (since this page load):

MSVCRT PRNG state mark:

Current Math.random():

Calculated next Math.random() values: