We love eBooks
    BeagleBone for Secret Agents
    Publisher

    This site is safe

    You are at a security, SSL-enabled, site. All our eBooks sources are constantly verified.

    BeagleBone for Secret Agents

    By Josh Datko

    What do you think about this eBook?

    About

    Browse anonymously, communicate secretly, and create custom security solutions with open source software, the BeagleBone Black, and cryptographic hardware

    About This Book

    • Interface with cryptographic hardware to add security to your embedded project, securing you from external threats.
    • Use and build applications with trusted anonymity and security software like Tor and GPG to defend your privacy and confidentiality.
    • Work with low level I/O on BeagleBone Black like I2C, GPIO, and serial interfaces to create custom hardware applications.

    Who This Book Is For

    If you have some experience with the BeagleBone or similar embedded systems and want to learn more about security and privacy, this book is for you. Alternatively, if you have a security and privacy background and want to learn more about embedded development, this book is for you. You should have some familiarity with Linux systems and with the C and Python programming languages.

    What You Will Learn


    • Build a complete BeagleBone development environment with Emacs and modern Emacs extensions

    • Understand how Tor protects Internet privacy and how to run a Tor bridge

    • Add custom hardware to the BeagleBone's I2C, serial, GPIO, and analog to digital interfaces

    • Gain insight into the BeagleBone cape ecosystem by exploring the design of the CryptoCape

    • Use a Trusted Platform Module to protect your GPG keys

    • Build an Off-the-Record chat gateway

    • Develop and analyze threat models for security-related projects

    In Detail

    The BeagleBone Black is a small but powerful low-powered computer that can be used to protect personal secrets and enable privacy enhancing technologies. With increasing concerns over Internet surveillance, you can combine time-tested open source security software with the small form factor of the BeagleBone Black to create custom personal security applications.

    Starting with an introduction to development with the BeagleBone Black, we'll show you how to use the BeagleBone to create custom hardware projects involving security and privacy. Each chapter provides the history and background of each technology with a self-contained and practical project. You'll explore devices such as a fingerprint scanner and the Trusted Platform Module on the CryptoCape while learning about authentication and encryption. Filled with projects that utilize security tools used by journalists, activists, and government agents, this book shows you how to apply these tools with a BeagleBone Black.

    Download eBook Link updated in 2017
    Maybe you will be redirected to source's website
    Thank you and welcome to our newsletter list! Ops, you're already in our list.

    Related to this eBook

    Browse collections Find similar eBooks

    Keep connected to us

    Follow us on Social Media or subscribe to our newsletter to keep updated about eBooks world.

    Explore eBooks

    Browse all eBook collections

    Collections is the easy way to explore our eBook directory.