Summary: jitterentropy is a RNG designed in the spirit of haveged (using CPU timer jitter as entropy source) except it made up of a kernel module - mainlined since Linux 4.2 and a userspace daemon (jitterentropy-rngd*) to prevent /dev/random from blocking. The advantage of jitterentropy is by taking advantage of a loaded kernel module, it can ensure randomness is being collected before the CSPRNG is initialized. So, when CSPRNG initialization happens, we can ensure that it is properly seeded on first boot, minimizing the likelihood that exact keys will be created on distinct systems. This is something haveged can't provide, as it runs entirely in userspace.
*jitterentropy-rngd is now included in Debian sid so we should look out for its eventual inclusion in stable next.
It would be a good alternative to haveged especially for hypervisors that don't support virtio-RNG and so don't have access to entropy sources early during boot process.
* mailing list thread answered with jitterentropy developer: [How to confirm jitter .ko was loaded](https://www.whonix.org/pipermail/whonix-devel/2019-April/001364.html)