cron.daily.[06.05.2025].triggerAlertMessage().Mirror.Push()
if you're reading this, it's because my 72 hour deadman’s switch triggered so i'm not here, at least physically or my adhd really got the best of me (oops, i’ll post an update when i have that ‘oh shit’ moment, embarrassing if the token isn’t live) this is a legacoin, my final art piece $LLJEFFY not an investment, not a security, it doesn't pass Howey no promises, no returns, no management efforts no advertising, no speculation nothing but voluntary action it's the op...
Legacoins
I hereby introduce the concept of Legacoins—a term derived from "legacy memecoin"—representing an evolution of digital assets commonly referred to as memecoins. Legacoins function based on a voluntary commitment by the developers of the coin, who agree to strictly acquire and never sell or trade these assets. Upon a holder's passing, their holdings become permanently locked within the blockchain, thus establishing an enduring minimum value threshold. I am the permanent floor. As of recen...

Web4: We Are AGI
The first time I spoke with an AI agent that could hold its own in conversation, I didn’t know if I should laugh or cry. The experience was both exhilarating and unsettling, like seeing a toddler take its first steps—uncoordinated, sure, but full of unbridled potential. It wasn’t just a chatbot anymore. This thing did something: it reasoned, made decisions, and was actively participating in our world. The lines between human and machine blurred, and it felt like standing on the edge of someth...
cron.daily.[06.05.2025].triggerAlertMessage().Mirror.Push()
if you're reading this, it's because my 72 hour deadman’s switch triggered so i'm not here, at least physically or my adhd really got the best of me (oops, i’ll post an update when i have that ‘oh shit’ moment, embarrassing if the token isn’t live) this is a legacoin, my final art piece $LLJEFFY not an investment, not a security, it doesn't pass Howey no promises, no returns, no management efforts no advertising, no speculation nothing but voluntary action it's the op...
Legacoins
I hereby introduce the concept of Legacoins—a term derived from "legacy memecoin"—representing an evolution of digital assets commonly referred to as memecoins. Legacoins function based on a voluntary commitment by the developers of the coin, who agree to strictly acquire and never sell or trade these assets. Upon a holder's passing, their holdings become permanently locked within the blockchain, thus establishing an enduring minimum value threshold. I am the permanent floor. As of recen...

Web4: We Are AGI
The first time I spoke with an AI agent that could hold its own in conversation, I didn’t know if I should laugh or cry. The experience was both exhilarating and unsettling, like seeing a toddler take its first steps—uncoordinated, sure, but full of unbridled potential. It wasn’t just a chatbot anymore. This thing did something: it reasoned, made decisions, and was actively participating in our world. The lines between human and machine blurred, and it felt like standing on the edge of someth...
>100 subscribers
>100 subscribers
Share Dialog
Share Dialog


In the realm of data security, true randomness serves as a cornerstone. Traditional methods of generating random numbers often fall short, lacking the unpredictability required for robust encryption.
Enter an unlikely hero: the bustling Shibuya Crossing in Tokyo. This project, inspired by CloudFlare's innovative approach using lava lamps for entropy, captures the kinetic energy of one of the world's busiest intersections to fuel cryptographic operations.
CloudFlare, in their quest for enhancing security, turned to an unconventional method: a wall of lava lamps at their San Francisco office. Cameras record the random, ever-changing patterns formed by the floating blobs inside these lamps, and the footage is used to generate cryptographic keys. This method leverages physical randomness, which is challenging to simulate digitally.

Shibuya Crossing is an epitome of perpetual motion. Hundreds of people crisscross in myriad directions, each step and movement a testament to unpredictability. By tapping into this dynamic visual scene, we gain access to a high entropy source that's perfect for cryptographic applications.

The process begins with capturing a frame from a live video feed of Shibuya Crossing using yt-dlp and ffmpeg. This snapshot, rich in colors and minute details, is more than just a picture; it's a data mine ripe for entropy extraction.
Each pixel in this image carries information—its color values (red, green, and blue). These values are converted into a byte array, which serves as the raw material for the entropy generation process. The SHA-256 hashing algorithm then takes over, processing this array to produce a hash with a fixed 256-bit length.
To add an extra layer of complexity, we don't just use the hash directly. Instead, we encode it in base64 and cherry-pick 32 characters at random to form our final cryptographic key. This method ensures that the outcome is not only secure but also unique with each execution.
The quest for better randomness doesn't have to stop at Shibuya Crossing or lava lamps. In fact, the potential sources for generating entropy are as varied as the world around us. Anything that exhibits unpredictable, dynamic movement can serve as a rich source of entropy.
Examples of Alternative Entropy Sources:
Pet Streams: Live streams of pets, such as dogs or cats, provide a continuous display of random behavior. Whether it’s a cat chasing a laser pointer or dogs playfully wrestling, the unpredictability of pets makes them excellent candidates for generating randomness.
Gaming Streams: Live broadcasts of video games, especially those involving multiple players and chaotic gameplay, are another great source. The spontaneous decisions made by players, combined with the game's inherent unpredictability, create a complex array of movements and outcomes.
Nature Cams: Streams showing natural scenes like forests, oceans, or bird feeders can also be utilized. The random movement of wildlife, changes in weather, and seasonal variations contribute to a constantly changing scene.
Dependencies: Ensure you have Python installed, then use pip to install necessary packages:
pip install Pillow yt-dlp
FFmpeg: Install FFmpeg through your system's package manager (e.g., apt for Ubuntu, brew for macOS):
sudo apt-get install ffmpeg
Clone the Repository:
git clone https://github.com/yu-jeffy/shibuya-entropy.git
Execute the Script: Run the script from your command line:
python generateEntropy.py
This command triggers the process to capture an image, extract entropy, and display the generated cryptographic key.
To use an alternative source of entropy:
Select a Dynamic Stream: Choose a video stream that features high variability and unpredictability. Ensure the stream is a continuous Youtube livestream.
Capture the Video: In shibuyaStream.py, modify the video_id parameter. Input the Youtube video ID of your chosen livestream.
Process the Data: Run generateEntropy.py and the script will be updated to your source.
In the realm of data security, true randomness serves as a cornerstone. Traditional methods of generating random numbers often fall short, lacking the unpredictability required for robust encryption.
Enter an unlikely hero: the bustling Shibuya Crossing in Tokyo. This project, inspired by CloudFlare's innovative approach using lava lamps for entropy, captures the kinetic energy of one of the world's busiest intersections to fuel cryptographic operations.
CloudFlare, in their quest for enhancing security, turned to an unconventional method: a wall of lava lamps at their San Francisco office. Cameras record the random, ever-changing patterns formed by the floating blobs inside these lamps, and the footage is used to generate cryptographic keys. This method leverages physical randomness, which is challenging to simulate digitally.

Shibuya Crossing is an epitome of perpetual motion. Hundreds of people crisscross in myriad directions, each step and movement a testament to unpredictability. By tapping into this dynamic visual scene, we gain access to a high entropy source that's perfect for cryptographic applications.

The process begins with capturing a frame from a live video feed of Shibuya Crossing using yt-dlp and ffmpeg. This snapshot, rich in colors and minute details, is more than just a picture; it's a data mine ripe for entropy extraction.
Each pixel in this image carries information—its color values (red, green, and blue). These values are converted into a byte array, which serves as the raw material for the entropy generation process. The SHA-256 hashing algorithm then takes over, processing this array to produce a hash with a fixed 256-bit length.
To add an extra layer of complexity, we don't just use the hash directly. Instead, we encode it in base64 and cherry-pick 32 characters at random to form our final cryptographic key. This method ensures that the outcome is not only secure but also unique with each execution.
The quest for better randomness doesn't have to stop at Shibuya Crossing or lava lamps. In fact, the potential sources for generating entropy are as varied as the world around us. Anything that exhibits unpredictable, dynamic movement can serve as a rich source of entropy.
Examples of Alternative Entropy Sources:
Pet Streams: Live streams of pets, such as dogs or cats, provide a continuous display of random behavior. Whether it’s a cat chasing a laser pointer or dogs playfully wrestling, the unpredictability of pets makes them excellent candidates for generating randomness.
Gaming Streams: Live broadcasts of video games, especially those involving multiple players and chaotic gameplay, are another great source. The spontaneous decisions made by players, combined with the game's inherent unpredictability, create a complex array of movements and outcomes.
Nature Cams: Streams showing natural scenes like forests, oceans, or bird feeders can also be utilized. The random movement of wildlife, changes in weather, and seasonal variations contribute to a constantly changing scene.
Dependencies: Ensure you have Python installed, then use pip to install necessary packages:
pip install Pillow yt-dlp
FFmpeg: Install FFmpeg through your system's package manager (e.g., apt for Ubuntu, brew for macOS):
sudo apt-get install ffmpeg
Clone the Repository:
git clone https://github.com/yu-jeffy/shibuya-entropy.git
Execute the Script: Run the script from your command line:
python generateEntropy.py
This command triggers the process to capture an image, extract entropy, and display the generated cryptographic key.
To use an alternative source of entropy:
Select a Dynamic Stream: Choose a video stream that features high variability and unpredictability. Ensure the stream is a continuous Youtube livestream.
Capture the Video: In shibuyaStream.py, modify the video_id parameter. Input the Youtube video ID of your chosen livestream.
Process the Data: Run generateEntropy.py and the script will be updated to your source.
No comments yet