In a Reddit Ask Me Anything last Wednesday, Intel CEO Brian Krzanich opened the floor for questions, but notably ignored the most popular one in the thread: in light of recent NSA revelations, what will the company do to assure that its chips don’t contain a backdoor for the NSA ?

While Kzarnich never answered any of the security-related questions–Intel PR says this is because the questions came late and Kzarnich either missed them entirely or couldn’t reply in time–one Redditor, Bardfinn, responded at length on the issue of encryption and security.

Bardfinn’s real name is Steve Akins, and in an email correspondence he describes his interest in cryptography and Internet security as personal and societal/political. But he’s quite literate on the subject.

“It’s an immense problem for the layman,” Akins says. “Cryptography is difficult to use, touches many parts of our lives, and has not become significantly less difficult in the past 30 years… In our tablets and smartphones, and the networks they connect to, cryptography is handled for us by the manufacturers. We never see it, never interact with it, and in many cases *cannot* interact with it.” We’re placing an immense amount of trust in the cryptography of manufacturers, Akins argues, and therefore we’re effectively “trusting them not to peek.”

Of course, everyone can’t be a skilled cryptographer, and since absolute security isn’t really possible, there will always have to be some element of trust involved between manufacturers and everyday people–but Akins believes that trust needs to be verifiable, mitigated, and distributed:

The problem isn’t that we have to trust a black box in our personal devices. The problem is that we have to trust that one black box, and many black boxes on the Internet (or cellular network) which may or may not be as secure as the black box in our devices, and the ones in our computers and the ones in the networks interoperate at the lowest common denominator, and they all probably have back doors (which makes it really hard to actually trust them), and the ones on the Internet are highly targetable by the bored kids, criminals, etc: Bad Actors.

To understand the root cause of this concern, and what can be done about it, it helps to have some understanding of how your computer goes about encrypting things to ensure that prying eyes don’t see what you don’t want them to see. For your computer to lock your data up tight and send it on its way, it relies on something that computers are in reality quite bad at: randomness.

Random numbers are a necessity for building secure systems, as they’re the only way to make sure your encryption key stays secure. However, generating random numbers can be extraordinarily difficult, especially with software. Programs and computers are run by logic and if-then conditionals–asking them to pull numbers out of thin air without a prescribed formula is the sort of simple thing human minds can do that trip up computers. We call that predictability entropy. The higher your entropy, the harder it is to crack your encryption.