future-proof, tamper-proof rng:
discussing the vulnerabilities of traditional rng
We know that complete transparency of the draw process […]
image source: www.schneier.com
Bruce Schneier on Major Security Vulnerabilities in Microprocessors
We would like to share some comme […]
Meet us at ICE in London from February 6th-8th!
Please contact us to schedule a meeting!
Szrek2Solutions would like to […]
Defining the Case for
Nonrepudiation and Draw Integrity
Draw Nonrepudiation protects lotteries against draw system vulnerabilities. Draw s […]
View the full white paper, “Redefining Electronic Draw Security” here.
Electronic draw machines ar […]
Following the recent incorrect draw results in Arizona, perception of electronic lottery drawings are at an all-time low. We outline a solut […]
Knowledge@Wharton has a provocative article titled “After Equifax, Can Our Data Ever Be Safe?”
Read our commentary below, and you can fi […]
Following the recent incorrect draw results in Arizona, perception of electronic lottery drawings are at an all-time low. Helena Pereira and […]
A RNG machine used by Arizona Lottery generated duplicate numbers for several consecutive games. This type of problem can be a result of def […]