From 764b273c9ba2e4f13cbf782319cf2a1377d37469 Mon Sep 17 00:00:00 2001 From: Carlos Holguera Date: Fri, 10 Jan 2025 11:50:24 +0100 Subject: [PATCH] Update MASTG-BEST-0001.md (#3110) --- best-practices/MASTG-BEST-0001.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/best-practices/MASTG-BEST-0001.md b/best-practices/MASTG-BEST-0001.md index 38550af272..7410c8ab9e 100644 --- a/best-practices/MASTG-BEST-0001.md +++ b/best-practices/MASTG-BEST-0001.md @@ -17,4 +17,4 @@ Although [the documentation](https://developer.android.com/reference/java/securi ## Other Languages -Consult the standard library or framework documentation to find the API that exposes the operating system's cryptographically secure pseudorandom number generator (kernel-based CSPRNG). This is usually the safest approach, provided there are no known vulnerabilities in that library's random number generation. For example, see the [Flutter/Dart issue](https://www.zellic.io/blog/proton-dart-flutter-csprng-prng/) as a reminder that some frameworks may have known weaknesses in their PRNG implementations. +Consult the standard library or framework documentation to find the API that exposes the operating system's cryptographically secure pseudorandom number generator. This is usually the safest approach, provided there are no known vulnerabilities in that library's random number generation. For example, see the [Flutter/Dart issue](https://www.zellic.io/blog/proton-dart-flutter-csprng-prng/) as a reminder that some frameworks may have known weaknesses in their PRNG implementations.