Tom, I made it clear which comments I was addressing by quoting them.
If you really want to hack my example, you should bear in mind that the “heads”, “tails”, and “edge” values are produced by taking bytes from a cryptographic source of randomness, and using heads: more 0s than 1s; tails: more 1s than 0s; edge: other cases.
Tom, I made it clear which comments I was addressing by quoting them.
If you really want to hack my example, you should bear in mind that the “heads”, “tails”, and “edge” values are produced by taking bytes from a cryptographic source of randomness, and using heads: more 0s than 1s; tails: more 1s than 0s; edge: other cases.