1/12/2024 0 Comments Facebook random name picker![]() It is the reason that you can gain more credibility using our 3-step randomness process certification. With the firmly secure SHA512 Hash, It is almost inconceivable that any modified file can pass step 3 verification. The SHA512 hash code should be the same if the file did not be changed.Ī person can use a fake screenshot or video to change the winner name from local computers, but can not change the information stored on our server. You can optional share the result with the winners via Facebook. You can let him go to step 3, use our SHA512 Hash Generator to check the downloaded file. The result is showing the winner(s) of the random name picker, the total count of all. ![]() Here is Demo of The Client-side Certification File link.įinally, what if another John Doe doubt you have modified the file? In this case, you can go to step 2 to download your client-side certification file to prove that your data source has no error. However, what if somebody doesn't like the winner, and want to check whether there are many duplicate John Doe No. When you give this link and the full winner name to your attendees, most people will trust that your raffle is random. Our server will store a part of the information, including the winner's name (asterisked), total names, timestamp, and a SHA512 hash code. 090, here is Demo of The Server-side Certification Link. Name Picker is the free website with giveaways tools for Facebook, Instagram, YouTube and useful online tools. If you use Random Name Picker for raffles, contests, drawings, giveaways, and promotions, etc., you are encouraged to enable 3-step Randomness Process Certification function to improve your credibility.įor example, you use the name picker to raffle off a prize to 99 people from John Doe No. Facebook Giveaway Picker is a free winner picker tool that randomly picks winners from Facebook comments for your giveaway, contest, raffle or promotion on. For this situation, you can use our 3-step Randomness Process Certification to prove that the whole process is clean and "random." We don't want that somebody use our tool to raffle off a prize, but bypass the random process, and record a video to say, "Hey, we picked a random winner by a tool from ." So we choose a server-side solution.īy using server-side random function, the only thing that the malicious code or a person can change is the data source. It is something which the developers can not control. It can happen in the background process, which other people can not see on the screen. If using random function from Javascript, as the full source codes are stored on users' local computers, it is impossible to prevent a malicious code or any person from doing something to bypass the random function and set a value to the "winner" directly. Moreover, view source will lead to the original comment. Data in Excel (xls): In worksheet, there are post information such as profile name, comments, and timestamp. However, it is a different story on actual real-world operations: Pick random name: click Random for picking the winners, it can pick multiple winners by click Random again. ![]() Both are the same from the technical part - the random function from Python and Javascript both generate pseudo-random numbers. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |