Preface

BeagleBone Black inspires embedded hackers in different ways. Some see it as a controller board for a small robot, while others see it as a low-power, network server. In this book, we'll treat BeagleBone Black as a defender of personal security and privacy. Each chapter will discuss a technology and then provide a project to reinforce the concept.

Let's get started!

What this book covers

Chapter 1, Creating Your BeagleBone Black Development Environment, starts the journey by showing you how to set up Emacs to maximize your embedded hacking.

Chapter 2, Circumventing Censorship with a Tor Bridge, walks through how to transform the BeagleBone Black into a Tor server with a front panel interface.

Chapter 3, Adding Hardware Security with the CryptoCape, investigates biometric authentication and specialized security chips.

Chapter 4, Protecting GPG Keys with a Trusted Platform Module, shows you how to use the BeagleBone Black to safeguard e-mail encryption keys.

Chapter 5, Chatting Off-the-Record, details how to run an IRC gateway on the BeagleBone Black to encrypt instant messaging.

Appendix, Selected Bibliography, lists the referenced works cited throughout the book.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.133.130.199