Cargando…

BeagleBone for Secret Agents.

The BeagleBone Black is a small but powerful low-powered computer that can be used to protect personal secrets and enable privacy enhancing technologies. With increasing concerns over Internet surveillance, you can combine time-tested open source security software with the small form factor of the B...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Datko, Josh
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Packt Publishing, 2014.
Colección:Community experience distilled.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Cover; Copyright; Credits; Foreword; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Creating Your BeagleBone Black Development Environment; Introducing the BBB; Appreciating BBB''s commitment to Open Source Hardware; Unboxing the BBB and providing power; Creating an embedded development environment with Emacs; Understanding the complications of embedded development; Installing Emacs 24; Installing the prelude; Learning how to learn about Emacs; Streamlining the SSH connections; Discovering the IP address of your networked BBB.
  • Editing the SSH configuration fileConfiguring password-less login; Running an SSH agent to control access to your SSH keys; Connecting to BBB with TRAMP; Running commands from Emacs; Using Emacs dired to copy files to and from BBB; Finding additional background information; Finding additional cryptography resources; Finding additional electronics resources; Finding additional Debian resources; Summary; Chapter 2: Circumventing Censorship with a Tor Bridge; Learning about Tor; Appreciating the various users of Tor; Understanding Tor relays; Understanding Tor bridges.
  • Using obfuscated proxies and pluggable transportsRealizing the limitations of Tor; The impact and benefits of running a Tor bridge; Installing Tor on BBB; Installing Tor from the development repository; Configuring Tor for BBB; Adding contact details to the torrc file; Tuning the bandwidth usage of your bridge; Understanding Tor exit policies; Setting bridge-specific settings; Starting your new Tor bridge; Enabling port forwarding; Adding physical interfaces to the bridge; Gathering the front panel components; Using an LCD to display status information.
  • Controlling the bandwidth with a potentiometerDesigning the BeagleBridge circuit; Wiring the hardware with a proto cape; Developing the software using Python libraries; Controlling the hardware with pyBBIO; Determining your bandwidth with speedtest-cli; Controlling the bridge with the Stem library; Connecting to your obfuscated bridge; Continuing with Tor-related projects; Summary; Chapter 3: Adding Hardware Security with the CryptoCape; Exploring the differences between hardware and software cryptography; Understanding the advantages of hardware-based cryptography.
  • Offloading computation to a separate processorProtecting keys through physical isolation; Understanding the disadvantages of hardware crypto devices; Lacking cryptographic flexibility; Exposing hardware-specific attack vectors; Obfuscating implementation details; Summarizing the hardware versus software debate; Touring the CryptoCape; Discovering the I2C protocol; Understanding the benefit of cape EEPROMs; Creating a cape EEPROM; Creating the cape DTS file; Creating an eLinux wiki site; Keeping time with a real-time clock; Trusting computing devices with a Trusted Platform Module.