Source: bootclockrandomization
Section: misc
Priority: optional
Maintainer: linuxmangaka <linuxmangaka@gmail.com>
Rules-Requires-Root: no
Build-Depends: debhelper (>= 13),
 debhelper-compat (= 13),
 dh-apparmor,
 pkgconf,
 pkg-config,
Standards-Version: 4.6.2
Homepage: https://github.com/Kicksecure/bootclockrandomization
Vcs-Browser: https://github.com/Kicksecure/bootclockrandomization
Vcs-Git: https://github.com/Kicksecure/bootclockrandomization.git

Package: bootclockrandomization
Architecture: all
Depends: ${shlibs:Depends},
 ${misc:Depends},
 msgcollector,
Description: Randomizes clock when systems boots
 Randomizes clock at boot time. Moves clock a few seconds and nanoseconds to past or future. Useful in context of anonymity/privacy/Tor. This is useful to enforce the design goal, that the host clock and Gateway/Workstation clock should always slightly differ (even before secure timesync succeeded!) to prevent time based fingerprinting / linkablity issues. Runs before Tor / sdwdate (if installed).