BeagleBone for Secret Agents.
The BeagleBone Black is a small but powerful low-powered computer that can be used to protect personal secrets and enable privacy enhancing technologies. With increasing concerns over Internet surveillance, you can combine time-tested open source security software with the small form factor of the B...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Packt Publishing,
2014.
|
Colección: | Community experience distilled.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Cover; Copyright; Credits; Foreword; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Creating Your BeagleBone Black Development Environment; Introducing the BBB; Appreciating BBB''s commitment to Open Source Hardware; Unboxing the BBB and providing power; Creating an embedded development environment with Emacs; Understanding the complications of embedded development; Installing Emacs 24; Installing the prelude; Learning how to learn about Emacs; Streamlining the SSH connections; Discovering the IP address of your networked BBB.
- Editing the SSH configuration fileConfiguring password-less login; Running an SSH agent to control access to your SSH keys; Connecting to BBB with TRAMP; Running commands from Emacs; Using Emacs dired to copy files to and from BBB; Finding additional background information; Finding additional cryptography resources; Finding additional electronics resources; Finding additional Debian resources; Summary; Chapter 2: Circumventing Censorship with a Tor Bridge; Learning about Tor; Appreciating the various users of Tor; Understanding Tor relays; Understanding Tor bridges.
- Using obfuscated proxies and pluggable transportsRealizing the limitations of Tor; The impact and benefits of running a Tor bridge; Installing Tor on BBB; Installing Tor from the development repository; Configuring Tor for BBB; Adding contact details to the torrc file; Tuning the bandwidth usage of your bridge; Understanding Tor exit policies; Setting bridge-specific settings; Starting your new Tor bridge; Enabling port forwarding; Adding physical interfaces to the bridge; Gathering the front panel components; Using an LCD to display status information.
- Controlling the bandwidth with a potentiometerDesigning the BeagleBridge circuit; Wiring the hardware with a proto cape; Developing the software using Python libraries; Controlling the hardware with pyBBIO; Determining your bandwidth with speedtest-cli; Controlling the bridge with the Stem library; Connecting to your obfuscated bridge; Continuing with Tor-related projects; Summary; Chapter 3: Adding Hardware Security with the CryptoCape; Exploring the differences between hardware and software cryptography; Understanding the advantages of hardware-based cryptography.
- Offloading computation to a separate processorProtecting keys through physical isolation; Understanding the disadvantages of hardware crypto devices; Lacking cryptographic flexibility; Exposing hardware-specific attack vectors; Obfuscating implementation details; Summarizing the hardware versus software debate; Touring the CryptoCape; Discovering the I2C protocol; Understanding the benefit of cape EEPROMs; Creating a cape EEPROM; Creating the cape DTS file; Creating an eLinux wiki site; Keeping time with a real-time clock; Trusting computing devices with a Trusted Platform Module.