Kernel will use randomness from kernel command line anyhow. See links in initial post in this forum thread. [1]
This is similar to systemd-random-seed.service. Just happens earlier.
Disadvantages:
- does not work for first boot
- does not work for live boot but no worse than too due to [1]
Rationale: “use as many sources of entropy as possible in case any breaks down”.
See also: twuewand - a truerand algorithm for generating entropy - Whonix integration
We distrust (set random.trust_cpu=off
kernel boot parameter) RDRAND. See:
Entropy, Randomness, /dev/random vs /dev/urandom, Entropy Sources, Entropy Gathering Daemons, RDRAND
I.e. it is used but not credited.
We don’t have issues with boot speed / performance thanks to haveged / jitterentropy-rng (user space daemon and kernel module).