Re: Passing of Random Data
There are already multiple websites that claim to distribute true-random data, such as HotBits and EntropyPool. Of course, if you're not getting them over a secure channel, an attacker might substitute chosen data. And you have to trust the source in the first place.
(HotBits offers conventional TLS for a secure channel, so that's great, unless there are any problems with TLS or the X.509 PKI. Hmm. EntropyPool doesn't even use TLS.)
If such a scheme were popular, who's to say the NSA wouldn't set up a whole bunch of sock puppets sending data generated with DUAL_EC_DRBG? No one's shown how to distinguish its output from truly random data, but it's widely believed to be backdoored.
And if you already have a trustworthy channel, why do you need those "large blocks of random data"?