Entropy Generator
Move your mouse to generate true randomness.
(Your chaos creates crypto)
🤔 How Does This Work?
Mouse Movements
Your random mouse movements create unpredictable data points - position, timing, speed, and direction.
Entropy Pool
We collect this randomness into an entropy pool, mixing it with timestamps and other unpredictable sources.
Key Generation
The entropy is hashed with SHA-256 to create a cryptographically secure 256-bit private key.
This is for demonstration purposes. For real wallets, use hardware wallets or trusted software with proper entropy sources. Keys generated here should NOT be used for storing real funds.
🎯 Entropy Fun Facts
Why Entropy Is the Foundation of Wallet Security
A Bitcoin or Ethereum wallet is only as secure as the randomness used to create its private key. The cryptographic algorithms behind secp256k1, SHA-256, and Keccak-256 are battle-tested and unbroken — but if the input that seeds them is predictable, the entire security model collapses. Every documented case of "instant wallet drain" in the past decade has traced back to weak entropy: a non-random seed, a buggy PRNG, a hardcoded constant, or a timestamp used in place of true randomness.
The mouse-entropy generator on this page collects unpredictable samples as you move the cursor. Each motion event contributes the X and Y coordinates, the time since the last event in milliseconds, and the velocity. These values are concatenated and hashed with SHA-256 once enough events accumulate. Because human motion contains chaotic micro-tremors and irregular timing patterns, the entropy estimator reports usable randomness fairly quickly. Once 256 bits have been collected, the final hash becomes your private key, from which the standard secp256k1 derivation produces matching Bitcoin and Ethereum addresses.
For real-world key generation, a single source of entropy is rarely considered enough. Hardware wallets like Ledger and Trezor combine onboard hardware RNGs with the device\'s firmware CSPRNG. Software wallets on modern operating systems use /dev/urandom, BCryptGenRandom, or SecRandomCopyBytes, which are themselves seeded from many sources including thermal noise, interrupt timing, and disk activity. The mouse-entropy demo here is excellent for understanding the concept — but never use it to secure real funds.
Frequently Asked Questions About Entropy
What is entropy in cryptography?
Entropy is a measure of unpredictability. A 256-bit private key needs at least 256 bits of true randomness so that no attacker can guess or recompute it. If the source of randomness is biased or predictable, the keyspace shrinks dramatically and an attacker can brute-force the wallet.
How much entropy do I need for a secure private key?
Bitcoin and Ethereum require 256 bits of entropy. Real-world wallets typically gather entropy from multiple sources — operating system CSPRNG, hardware noise, mouse movements, microphone input — and mix them with a hash function like SHA-256 to produce the final key.
Is mouse-movement entropy actually secure?
For a demonstration, yes. For real funds, no. Mouse motion contains useful entropy but it can be partially predicted, recorded by malware, or biased by hardware. Production wallets should rely on the operating system's vetted CSPRNG, ideally combined with a dedicated hardware RNG.
What happens when crypto wallets use bad entropy?
Funds get stolen. The 2013 Android SecureRandom bug let attackers regenerate dozens of Bitcoin keys. The 2022 Profanity vanity-address tool used a weak 32-bit seed and lost users tens of millions of dollars. Weak entropy is the single most common cause of catastrophic wallet failure.
Why does the entropy bar fill up faster when I move the mouse erratically?
Each mouse event contributes a small amount of measurable entropy: position, delta, speed, and timing. Erratic motion produces less-correlated samples, so each event yields more entropy. Smooth, repetitive motion produces predictable samples that the estimator counts as low-entropy.