Quick Answer: Generating truly random numbers on deterministic computers requires gathering physical entropy from the environment — CPU temperatures, mouse movements, or network latency. This is the foundation of cryptographic security.
When engineers talk about pseudo-randomness, they are referring to equations like the Mersenne Twister. While excellent for statistics and simulations, they fail catastrophically in cryptographic applications. To achieve true security, modern systems maintain an Entropy Pool.