Each of the functions in this Gist use a system provided source of cryptographically secure random bytes. Typical, built-in random number functions are weak and unreliable for true randomness. These functions are small, dependency-free and fairly portable across different language versions and environments. They have each been tested repeatedly over many millions of iterations.