## Copyright (C) 2012 - 2025 ENCRYPTED SUPPORT LLC <adrelanos@kicksecure.com>
## See the file COPYING for copying conditions.

Source: bootclockrandomization
Section: misc
Priority: optional
Maintainer: Patrick Schleizer <adrelanos@kicksecure.com>
Build-Depends: debhelper (>= 13.11.6), debhelper-compat (= 13), dh-apparmor
Homepage: https://www.kicksecure.com/wiki/Boot_Clock_Randomization
Vcs-Browser: https://github.com/Kicksecure/bootclockrandomization
Vcs-Git: https://github.com/Kicksecure/bootclockrandomization.git
Standards-Version: 4.7.2
Rules-Requires-Root: no

Package: bootclockrandomization
Architecture: all
Depends: msgcollector, ${misc:Depends}
Description: Randomizes clock when systems boots
 Randomizes clock at boot time. Moves clock a few seconds and nanoseconds
 to past or future. Useful in context of anonymity/privacy/Tor.
 .
 This is useful to enforce the design goal, that the host clock and
 Gateway/Workstation clock should always slightly differ (even before secure
 timesync succeeded!) to prevent time based fingerprinting / linkablity
 issues.
 .
 Runs before Tor / sdwdate (if installed).
 .
 See also: https://www.whonix.org/wiki/Dev/TimeSync
