On https://www.whonix.org/pipermail/whonix-devel/2019-April/001371.html its developer wrote:
> [...] > - the in-kernel crypto API has an RNG framework that provides a DRBG. This DRBG is used for in-kernel crypto API purposes. It may be accessed from user space via AF_ALG [2]. Yet, this is not accessible from /dev/random, /dev/ urandom or getrandom. The DRBG uses the in-kernel JitterRNG to seed itself. > [...] Better entropy for in-kernel crypto API purposes sounds good as a general security enhancement. Fedora enables this kernel module by default, too. Does this sound like a good idea to enable loading this kernel module by default in Debian?