Can anyone reference me to an article that explores a technical analysis of how their random number generator was exploited? Did it not have full coverage (read: RANDU style error) or otherwise?
Actually, I found it here. Pretty interesting issue, I recommend the read. I'll summarize the paper here:
Java implementations primarily used on lightweight mobile platforms have a method called SecureRandom which generates pseudo random numbers for cryptographic operations. The integrated seed generator on some platforms provides a systematic means of determining the seed value and predicting seemingly secure outputs.
http://www.pnas.org/content/61/1/25.full.pdf+html