http://awoozruja5y3x2s3dsecryqk4bnaxezwxkn6e4mbo3fdkm6odw6brhid.onion/spyvsspy/COMM_OneTimePadGenerator_nopub.php
Suppose, for example, one used
four digit numeric keys, as used for Personal Identification
Numbers (PINs) by many credit card systems. Since only 10,000
different keys exist, one could simply compute the signatures of
every possible key from 0000 through 9999, permitting an attacker who
came into possession of the table of signatures to recover the
keys by a simple lookup process.