Let's say you cat /dev/random
or /dev/urandom
all day from boot to system shutdown, either redirecting the output to a file, or just catting it (in a terminal, or whatever) doesn't matter. Is this insecure, or a bad idea? If so, why?
Revealing random bytes when the system (and/or the applications running on it, think e.g sudo - when changing a password, or a browser that needs to generate session keys, (..) ) Does this pose any threat/or increase any kind of risk on any level?
By the way: The system that uses these PRNGS are compromised. The adversary has root access to the system.
If it does not pose a risk, or "is not a bad idea", doesn't it make (even if the chance or amount is extremely small!) the PRNG in question more predictable?