That's essentially how we use /dev/random in the security library. I wouldn't mind replacing the current seeding with something a little more trustworthy. I'm afraid that beating the cpu clock against the interrupt one will eventually fail because they'll end up being the same crystal on some system. On some architectures, like our SGI's they already are.