The system JD uses is close to as good as it gets (assuming proper implementation). This is possible to the standardization of strong cryptographic protocols (and hash functions, such as SHA).
You're using some strong wording there. Do you have any source or quotes to underline this or are you just wildly speculating?
sorry I have just an average brain, so could You please explain what You mean with
You're using some strong wording thereI am really very eager to understand why no TRNG is used or if a PRNG is used why not on a 3rd party server?
thanks