Finally got a reply fromn club wpt about there dealing program!

oldgrinder63

oldgrinder63

Enthusiast
Silver Level
Joined
Jul 11, 2019
Total posts
90
Chips
0
Here is the replie! any comments or opinions on this appreciated!

8 of many





cleardot.gif


cleardot.gif






























cleardot.gif


cleardot.gif




RE: The Club Services {LTK121420175118042X})








Inbox
x























The Club Services <members@theclubservices.com>


Nov 5, 2019, 12:18 AM (5 days ago)



cleardot.gif


cleardot.gif

to me

cleardot.gif


















Reference number: LTK121420175118042X Please use this ticket number in any correspondence with us.
Subject: The Club Services
Dear Customer,
Thank you for contacting us.
We have built our site from the ground up to provide our players with the safest and highest quality site on which to play blackjack and poker. Further, we are highly confident that the systems used for Random Number Generation (RNG), and the card-shuffling algorithm that utilizes those numbers, are the most advanced and reliable within the online blackjack and poker community—it would be difficult to find better in ANY application.

Here is a brief overview of the system that we use, and the methods by which we've approached RNG and card shuffling:
  1. Several competitors have experienced serious problems with pseudo-random number generation (PRNG). In some cases these problems have compromised the security of their systems (see article about ASF Software's PRNG flaw here). Some competitors in the online gaming market attempt to provide RNG by starting with a 32-bit seed for a PRNG. Unfortunately, this method provides only a very small set of outcomes in comparison to the randomness required for truly random shuffled decks of cards. Because of this, they tend to use shuffle algorithms that attempt to work around the quality limitations of the PRNG that they are using. Sites that shuffle cards utilizing a PRNG with a 32-bit seed, will only be able to produce 4,294,967,296 possible shuffles, or merely 0.000000000000000000000000000000000000000000000000000000005% (or 5 x 10-57%) of the possible ways to shuffle a deck. More importantly, however, the combination of the use of a PRNG and relatively small seeds (or even large seeds that are not sufficiently random) and faulty shuffling algorithms can allow a determined individual to predict the order of the remaining cards in a deck after seeing the first several cards that are dealt.
  2. Our approach is to forgo pseudo-random number generation wherever possible and instead use true random number generation from proven random physical devices. Our system utilizes thermal noise on a zener diode—shielded to prevent any environmental interference. The characteristics of this device are governed by the laws of quantum physics and are provably non-deterministic. Through the use of true random numbers and our shuffling algorithm (see below), we ensure first that it is impossible to predict the next card coming off the deck, and second that every possible shuffle combination is equally likely, all 8.06581751709439 X 1067 of them or 80,658,175,170,943,900,000, 000,000,000,000,000,000,000, 000,000,000,000,000, 000,000,000,000.
  3. Despite the fact that the device we use is largely held to provide sufficient randomness, our security software team was concerned with making the output from the devices even more quantifiably random and fault-tolerant than a simple single-device configuration by custom-designing the following features into our system:
    1. We follow all recommendations of the device manufacturer as to obtaining the highest quality random bit stream per device;
    2. Rather than just trusting that the raw data collected from the device is random, we test the quality of each sample from the device and reject samples which do not conform to (U.S.) Federal Information Processing Standards (FIPS) Publication 140-2 - Security Requirements for Cryptographic Modules, section 4.9.1 Power-On Tests, as published by the National Institute of Standards and Technology (NIST);
    3. These tests are performed for every sample collected;
    4. Samples that do not pass the test are not forwarded on to the mixer;
    5. We use two of the devices per hardware host and then mix their random streams via cryptographically-secure whitening functions, relieving any device-specific bias—or any other bias for that matter;
    6. The resultant output stream has been verified as appearing to be completely random over 100 runs of the DIEHARD and ent random verification test suites;
    7. Procedures are in place to replace faulty devices at the first sign of trouble, before gameplay can be adversely affected in any way;
    8. DIEHARD and ent were also used to verify randomness in situations where one of the devices is failing to produce high quality samples (i.e. a higher than nominal rejection rate due to FIPS-test failures).
  4. Our shuffling algorithm samples the stream of random numbers that is generated only when a card needs to be dealt or the deck needs to be reset between hands, thereby interleaving samples from all running games.
  5. To enhance the security of our random number infrastructure, the samples from the random stream are encrypted using a secure stream cipher prior to being used to select cards. This step does not in any way reduce the entropy inherent in the stream.
  6. The previous two components of our system insure that even if a person could access the system and the random number stream, or corrupt the random stream, it would still be EXTREMELY difficult to reliably determine the numbers actually used in the shuffle algorithm!
  7. The length of time that any particular number in the random stream is a candidate to be used to select a card to be dealt is very short.
  8. The algorithm used to select the next card to be dealt absolutely assures that every remaining card in the deck is exactly equally likely to be chosen.
  9. When starting a new hand, the deck is never presented for play in a known state and the deck is never returned to a known state between hands, or at any other time.

















 
freeringo

freeringo

2019-20-21 League Champs
Loyaler
Joined
Jun 4, 2009
Total posts
5,862
Awards
67
US
Chips
156
Wow that is very interesting indeed. I don't know if I feel safer or less secure after reading this.
 
Top