BeagleBone for Secret Agents by Josh Datko

By Josh Datko

Browse anonymously, speak secretly, and create customized safety suggestions with open resource software program, the BeagleBone Black, and cryptographic hardware

About This Book

  • Interface with cryptographic so as to add safety in your embedded venture, securing you from exterior threats.
  • Use and construct functions with relied on anonymity and defense software program like Tor and GPG to safeguard your privateness and confidentiality.
  • Work with low point I/O on BeagleBone Black like I2C, GPIO, and serial interfaces to create customized applications.

Who This publication Is For

If you could have a few event with the BeagleBone or comparable embedded platforms and need to profit extra approximately safety and privateness, this publication is for you. on the other hand, when you have a safety and privateness heritage and need to profit extra approximately embedded improvement, this booklet is for you. you'll have a few familiarity with Linux structures and with the C and Python programming languages.

What you are going to Learn

  • Build an entire BeagleBone improvement surroundings with Emacs and sleek Emacs extensions
  • Understand how Tor protects web privateness and the way to run a Tor bridge
  • Add customized to the BeagleBone's I2C, serial, GPIO, and analog to electronic interfaces
  • Gain perception into the BeagleBone cape surroundings via exploring the layout of the CryptoCape
  • Use a depended on Platform Module to guard your GPG keys
  • Build an Off-the-Record chat gateway
  • Develop and learn risk types for security-related projects

In Detail

The BeagleBone Black is a small yet strong low-powered laptop that may be used to guard own secrets and techniques and allow privateness bettering applied sciences. With expanding issues over web surveillance, you could mix time-tested open resource safety software program with the small shape issue of the BeagleBone Black to create customized own safety applications.

Starting with an advent to improvement with the BeagleBone Black, we are going to enable you use the BeagleBone to create customized initiatives regarding safety and privateness. every one bankruptcy offers the historical past and heritage of every know-how with a self-contained and sensible undertaking. you are going to discover units corresponding to a fingerprint scanner and the depended on Platform Module at the CryptoCape whereas studying approximately authentication and encryption. full of tasks that make the most of protection instruments utilized by reporters, activists, and govt brokers, this booklet indicates you ways to use those instruments with a BeagleBone Black.

Show description

Read Online or Download BeagleBone for Secret Agents PDF

Best cryptography books

Hieroglyphs: A Very Short Introduction (Very Short Introductions)

Hieroglyphs have been excess of a language. They have been an omnipresent and omnipotent strength in speaking the messages of old Egyptian tradition for over 3 thousand years. This old kind of expression used to be used as artwork, as a way of selecting Egyptian-ness, even for verbal exchange with the gods.

Understanding Windows CardSpace : an introduction to the concepts and challenges of digital identities

Wi>Understanding home windows CardSpaceis the 1st insider’s advisor to home windows CardSpace and the wider subject of identification administration for technical and company execs. Drawing at the authors’ unprecedented adventure earned through operating with the CardSpace product crew and via enforcing cutting-edge CardSpace-based platforms at top corporations, it deals unheard of perception into the realities of id administration: from making plans and layout via deployment.

Pairing-Based Cryptography – Pairing 2012: 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers

This ebook constitutes the refereed complaints of the fifth foreign convention on Pairing-Based Cryptography, Pairing 2012, held in Cologne, Germany, in might 2012. The 17 complete papers for presentation on the educational tune and three complete papers for presentation on the business song have been conscientiously reviewed and chosen from forty nine submissions.

Cryptography Extensions Practical Guide for Programmers

For a very long time, there was a necessity for a realistic, down-to-earth builders booklet for the Java Cryptography Extension. i'm more than pleased to determine there's now a publication that could resolution a number of the technical questions that builders, managers, and researchers have approximately this sort of severe subject. i'm convinced that this booklet will give a contribution enormously to the good fortune of securing Java purposes and deployments for e-business.

Extra resources for BeagleBone for Secret Agents

Example text

0:59519' The obfsproxy port for our obfs3 service is on 59519. From your home router, configure port forwarding from 9001, and configure port forwarding from 59519 from your external IP to BBB. It will also help if you give your BBB a static internal IP. Consult your router's manual for directions. 0:xxxx Replace the x's with the desired port address. However, it's best to let obfsproxy pick a random address; otherwise, the Tor Project might end up with an uneven distribution of bridges running on certain ports, which will make it easier to block access to bridges.

2V. Ohm's Law states that voltage is equal to the current multiplied by the resistance, or V = IR. 020 Amps gives 55 Ohms. 55 Ohms isn't a standard value, but 56 is, so you can use this. But, you can always use a higher resistance value, and the LED will just be less bright. The resistor used in this project had a value of 100 Ohms. [ 39 ] Circumventing Censorship with a Tor Bridge Wiring the hardware with a proto cape There are some special considerations when wiring this project as it is meant to go inside an enclosure to provide the front panel.

If you notice that the bridge is consuming more bandwidth than you'd like, as indicated by the LCD, you can turn down the volume of your bridge. The potentiometer and knob for this project are COM-09939 and COM-10001 (SparkFun Electronics). [ 37 ] Circumventing Censorship with a Tor Bridge Your bridge will not immediately attract users; it will take some time. Start with your bridge set at the max bandwidth; if you discover that it is consuming more bandwidth than you like, then turn it down. To receive an indication whether the Tor bridge is working, we will use an LED controlled by a BBB's GPIO, which will flash periodically.

Download PDF sample

Rated 4.73 of 5 – based on 24 votes