Browse anonymously, communicate secretly, and create custom security solutions with open source software, the BeagleBone Black, and cryptographic hardware.
BeagleBone Black inspires embedded hackers in different ways. Some see it as a controller board for a small robot, while others see it as a low-power, network server. In this book, we'll treat BeagleBone Black as a defender of personal security and privacy. Each chapter will discuss a technology and then provide a project to reinforce the concept.
What this book covers
Chapter 1, Creating Your BeagleBone Black Development Environment, starts the journey by showing you how to set up Emacs to maximize your embedded hacking.
Chapter 2, Circumventing Censorship with a Tor Bridge, walks through how to transform the BeagleBone Black into a Tor server with a front panel interface.
Chapter 3, Adding Hardware Security with the CryptoCape, investigates biometric authentication and specialized security chips.
Chapter 4, Protecting GPG Keys with a Trusted Platform Module, shows you how to use the BeagleBone Black to safeguard e-mail encryption keys.
Chapter 5, Chatting Off-the-Record, details how to run an IRC gateway on the BeagleBone Black to encrypt instant messaging.
Appendix, Selected Bibliography, lists the referenced works cited throughout the book.
Author: Josh Datko
BeagleBone for Secret Agents
- Product Code: BeagleBone
- Availability: In Stock
- Ex Tax: $15.00