You're reading from BeagleBone for Secret Agents
Gibb, Alicia. "The death of patents and what comes after." Accessed September 3, 2014. https://www.youtube.com/watch?v=z__Sbw1Ax4o. TEDx Stockholm, 2012.
BeagleBone Black Wiki. "WIFI Adapters." Accessed September 3, 2014. http://elinux.org/Beagleboard:BeagleBoneBlack#WIFI_Adapters.
Batsov, Bozhidar. "Package Management in Emacs: The Good, the Bad and the Ugly." Accessed September 3, 2014. http://batsov.com/articles/2012/02/19/package-management-in-emacs-the-good-the-bad-and-the-ugly/. 2012.
Batsov, Bozhidar. "Prelude." Accessed September 3, 2014. https://github.com/bbatsov/prelude. 2014.
Cygwin. Accessed September 3, 2014. https://www.cygwin.com.
Boneh, Dan. "Cryptography I." Accessed September 3, 2014. https://www.coursera.org/course/crypto.
Boneh, Dan. "Cryptography II." Accessed September 3, 2014. https://www.coursera.org/course/crypto2.
Molloy, Derek. "Setting up a C++ Cross-Development Platform." Accessed September 3, 2014. http://derekmolloy.ie/beaglebone/ setting-up-eclipse-on-the-beaglebone-for-c-development/. 2013.
edX. "Introduction to Linux." Accessed September 3, 2014. https://www.edx.org/course/linuxfoundationx/linuxfoundationx-lfs101x-introduction-1621.
eLinux Wiki. "BeagleBone Black Serial." Accessed September 3, 2014. http://elinux.org/Beagleboard:BeagleBone_Black_Serial.
EmacsWiki. "Emacs Newbie." Accessed September 3, 2014. http://www.emacswiki.org/emacs/EmacsNewbie.
EmacsWiki. "Viper Mode." Accessed September 3, 2014. http://www.emacswiki.org/emacs/ViperMode. 2014.
Corey, Gerald. "BeagleBone Black System Reference Manual. Beagleboard.org." Accessed September 3, 2014. https://github.com/CircuitCo/BeagleBone-Black/ blob/master/BBB_SRM.pdf?raw=true. 2014.
Hertzog, Raphael, and Roland Mas. The Debian Administrator's Handbook. Freexian SARL. 2013.
Homebrew. Accessed September 3, 2014. http://brew.sh/.
Axelson, Jan. "Using Eclipse to Cross-compile Applications for Embedded Systems." Accessed September 3, 2014. http://janaxelson.com/eclipse1.htm. 2014.
Katz, Jonathan. "Cryptography." Accessed September 3, 2014. https://www.coursera.org/course/cryptography.
Katz, Jonathan, and Yehuda Lindell. Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series). Chapman & Hall/CRC. 2007.
Khan Academy. "Electricity and magnetism." Accessed September 3, 2014. https://www.khanacademy.org/science/physics/electricity-and-magnetism.
Khan Academy. "Journey into cryptography." Accessed September 3, 2014. https://www.khanacademy.org/computing/computer-science/cryptography.
Murphy, Sean, and Fred Piper. Cryptography: A Very Short Introduction. Oxford University Press. 2002.
nixCraft. "Ubuntu / Debian Linux Regenerate OpenSSH Host Keys." Accessed September 3, 2014. http://www.cyberciti.biz/faq/howto-regenerate-openssh-host-keys/.
Nmap.org. "Microsoft Windows binaries." Accessed September 3, 2014. http://nmap.org/download.html#windows.
OSHWA. http://www.oshwa.org/definition/. 2013.
Paar, Christof, and Jan Pelzl. Understanding Cryptography: A Textbook for Students and Practitioners. Springer Publishing Company, Incorporated. 2009.
Munroe, Randall. "Permanence." Accessed September 3, 2014. https://xkcd.com/910/. 2008.
Munroe, Randall. "Real Programmers." Accessed September 3, 2014. https://xkcd.com/378/. 2008.
Chua, Sacha. "How to Learn Emacs." Accessed September 3, 2014. http://sachachua.com/blog/wp-content/uploads/2013/05/How-to-Learn-Emacs-v2-Large.png. 2013.
Scherz, Paul. Practical Electronics for Inventors. McGraw-Hill. 3rd edition. 2013.
Stallman, Richard M. "Emacs the extensible, customizable self-documenting display editor." In Proceedings of the ACM SIGPLAN SIGOA Symposium on Text Manipulation: 147–56. ACM, New York, NY, USA. 1981. Also available at http://doi.acm.Org/10.1145/800209.806466.
Stallman, Richard M. Gnu Emacs Manual: For Version 24.3. Free Software Foundation, 17th edition. 2013.
VirtualBox.org. Accessed September 3, 2014. https://www.virtualbox.org/.
Adafruit Industries. "Adafruit's BeagleBone IO Python Library". Accessed September 3, 2014. https://github.com/adafruit/adafruit-beaglebone-io-python.
Appelbaum, Jacob and Nick Mathewson. Pluggable transports for circumvention. 2010. Accessed September 3, 2014. https://gitweb.torproject.org/torspec.git/blob/refs/heads/master:/proposals/180-pluggable-transport.txt.
Dingledine, Roger. "Yes, we know about the Guardian article.". Accessed September 3, 2014. https://blog.torproject.org/blog/yes-we-know-about-guardian-article. 2013.
Dingledine, Roger and Nick Mathewson. Design of a blocking-resistant anonymity system. Technical Report 2006-11-001, The Tor Project, https://research.torproject.org/techreports/blocking-2006-11.pdf. November 2006.
Dingledine, Roger, Nick Mathewson, and Paul Syverson. "In Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13, SSYM'04." Tor: The second-generation onion router: 21. USENIX Association. Berkeley, CA, USA. 2004. http://dl.acm.org/citation.cfm?id=1251375.1251396.
Electronic Frontier Foundation. "The Legal FAQ for Tor Relay Operators." Accessed September 3, 2014. https://www.torproject.org/eff/tor-legal-faq.html.en. 2014
Fuss, Juergen, Tobias Pulls, and Philipp Winter. "Scramblesuit: a polymorphic network protocol to circumvent censorship." Proceedings of the 12th ACM workshop on Workshop on Privacy in the electronic society, WPES'13: 213-24. New York, NY, USA: ACM. 2013. Also available at http://doi.acm.org/10.1145/2517840.2517856.
Grusin, Mike. "Serial LCD quickstart." Accessed September 3, 2014. https://www.sparkfun.com/tutorials/246. 2011.
Kadianakis, George. "New obfsproxy transport: scramblesuit." Accessed September 3, 2014. https://lists.torproject.org/pipermail/tor-relays/2014-February/003886.html. 2014
speedtest-cli. Accessed September 3, 2014. https://github.com/sivel/speedtest-cli.
Tails. Accessed September 3, 2014. https://tails.boum.org/.
Tor Atlas. Accessed September 3, 2014. https://atlas.torproject.org/.
Tor Globe. Accessed September 3, 2014. https://globe.torproject.org/.
Tor Metrics. "Directly connecting users from Turkey." Accessed September 3, 2014. https://metrics.torproject.org/users.html?graph=userstats-relay-country&start=2014-01-04&end=2014-04-04&country=tr&events=off#userstats-relay-country.
Tor Project. "Installing Tor on Debian/Ubuntu." Accessed September 3, 2014. https://www.torproject.org/docs/debian.
Tor Project. Tc: A Tor control protocol (Version 1). Accessed September 3, 2014. https://gitweb.torproject.org/torspec.git?a=blob_plain;hb=HEAD;f=control-spec.txt.
Tor Stem. Accessed September 3, 2014. https://stem.torproject.org/.
Tor Stem. "Tutorials." Accessed September 3, 2014. https://stem.torproject.org/tutorials.html.
Atmel. "ATAES 132." Accessed September 3, 2014. http://www.atmel.com/devices/ataes132.aspx.
Beagleboard forum. Accessed September 3, 2014. https://groups.google.com/forum/#!forum/beagleboard.
eLinux Wiki. "BeagleBone Black." Accessed September 3, 2014. http://elinux.org/Beagleboard:BeagleBoneBlack.
Chaos Computer Club. "Chaos Computer Club Breaks Apple TouchID." Accessed September 3, 2014. http://www.ccc.de/en/updates/2013/ccc-breaks-apple-touchid. 2013.
Datko, Josh. "BeagleBone Black ATmega Flasher." Accessed September 3, 2014. https://github.com/jbdatko/BBB_ATmega328P_flasher. 2014.
Datko, Josh. "Cryptotronix:CryptoCape." Accessed September 3, 2014. http://elinux.org/Cryptotronix:CryptoCape. 2014.
Datko, Josh. "CryptoCape Device Tree Source." Accessed September 3, 2014. https://github.com/beagleboard/linux/blob/3.8/firmware/capes/BB-BONE-CRYPTO-00A0.dts. 2014.
Datko, Josh. "EClet" Accessed September 3, 2014. https://github.com/cryptotronix/eclet. 2014
Datko, Josh. "Hashlet." Accessed September 3, 2014. https://github.com/cryptotronix/hashlet. 2014.
Electronic Frontier Foundation. "Https Everywhere." Accessed September 3, 2014. https://www.eff.org/https-everywhere. 2014.
Gellesaug, David and Nicole Perlroth. "Russian hackers amass over a billion internet passwords. New York Times." http://www.nytimes.com/2014/08/06/technology/russian-gang-said-to-amass-more-than-a-billion-stolen-internet-credentials.html. 2014.
Texas Instrument. "AM335x Crypto Performance." Accessed September 3, 2014. http://processors.wiki.ti.com/index.php/AM335x_Crypto_Performance.
Munroe, Randall. "Heartbleed explanation." Accessed September 3, 2014. https://xkcd.com/1354/. 2014.
MythBusters. "Crimes and Myth-Demeanors 2." Episode 59. Accessed September 3, 2014. https://www.youtube.com/watch?v=3Hji3kp_i9k. 2006
NXP Semiconductor. I2C-Bus Specification and User Manual. http://www.nxp.com/documents/user_manual/UM10204.pdf. 2014.
O'Flynn, Colin. "Clock Glitch Attack Examples - Bypassing Password Check." Accessed September 3, 2014. https://www.youtube.com/watch?v=Ruphw98JWE&list=UUqc9MJwX_R1pQC6A353JmJg. 2014.
Oliveira, David. "BeagleBone Cape EEPROM Generator." Accessed September 3, 2014. https://github.com/picoflamingo/BBCape_EEPROM. 2013.
Petazzoni, Thomas. "Device Tree for Dummies." Embedded Linux Conference Europe. https://www.youtube.com/watch?v=m_NyYEBxfn8. 2013.
Skorobogatov, Dr Sergei. Physical Attacks on Tamper Resistance: Progress and Lessons. 2nd ARO Special Workshop on Hardware Assurance. http://www.cl.cam.ac.uk/~sps32/ARO_2011.pdf. 2011.
Appelbaum, Jacob. "GPG Configuration." Accessed September 3, 2014. https://github.com/ioerror/duraconf/raw/master/configs/gnupg/gpg.conf.
Appelbaum, Jacob, Joseph A. Calandrino, William Clarkson, Edward W. Felten, Ariel J. Feldman, J. Alex Halderman, Nadia Heninger, Seth D. Schoen, and William Paul. Lest We Remember: Cold-boot Attacks on Encryption Keys. 52(5): 91-98. Commun. ACM. 2009. Also available at http://doi.acm.org/10.1145/1506409.1506429.
Borisov, Nikita, George Danezis, and Ian Goldberg. DP5: A Private Presence Service. Technical Report 2014-10. The Tor Project. http://cacr.uwaterloo.ca/techreports/2014/cacr2014-10.pdf. 2014.
Datko, Josh. "CryptoCape Trusted Platform Module." Accessed September 3, 2014. http://cryptotronix.com/cryptocape-tpm/. 2014.
Free Software Foundation. "Email Self-Defense." Accessed September 3, 2014. https://emailselfdefense.fsf.org/en/index.html. 2014.
Free Software Foundation. The GNU Privacy Handbook. https://www.gnupg.org/gph/en/manual.html. 1999.
Greenwald, Glenn. No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. 2014. Metropolitan Books. USA.
Gutmann, Peter. "An Open-Source Cryptographic Coprocessor." Proceedings of the 9th Conference on USENIX Security Symposium - Volume 9, SSYM'00: 8-8. USENIX Association, Berkeley, CA, USA. 2000. Also available at http://dl.acm.org/citation.cfm?id=1251306.1251314.
HAVEGE. Accessed September 3, 2014. http://www.irisa.fr/caps/projects/hipsor/.
Huang, Bunnie. "On Hacking MicroSD Cards." Accessed September 3, 2014. http://www.bunniestudios.com/blog/?p=3554. 2013.
Langner, Ralph. Stuxnet: Dissecting a Cyberwarfare Weapon. 9(3): 49-51. IEEE Security and Privacy. 2011. Also available at http://dx.doi.org/10.1109/MSP.2011.67.
Levy, Steven. Crypto: How the Code Rebels Beat the Government: Saving Privacy in the Digital Age. Penguin USA, New York, NY, USA. 2001.
Marlinspike, Moxie. "A Critique of Lavabit." Accessed September 3, 2014. http://www.thoughtcrime.org/blog/lavabit-critique/. 2013.
Microsoft. "United States' Malware Infection Rate More than Doubles in the First Half of 2013." Accessed September 3, 2014. http://blogs.technet.com/b/security/archive/2014/03/31/united-states-malware-infection-rate-more-than-doubles-in-the-first-half-of-2013.aspx. 2014.
National Archives. "Frequently Asked Questions About Optical Storage Media." Accessed September 3, 2014. http://www.archives.gov/records-mgmt/initiatives/temp-opmedia-faq.html.
Opsahl, Kurt. "Why Metadata Matters." Accessed September 3, 2014. https://www.eff.org/deeplinks/2013/06/why-metadata-matters.
riseup.net. "OpenPGP Best Practices." Accessed September 3, 2014. https://help.riseup.net/en/security/message-security/openpgp/best-practices.
Shirey, R. "Internet Security Glossary. RFC 4949 (Informational)." Accessed September 3, 2014. http://www.ietf.org/rfc/rfc4949.txt. 2007.
Trusted Computing Group. "TPM 1.2 Specification." Accessed September 3, 2014. http://www.trustedcomputinggroup.org/resources/tpm_main_specification. 2011.
Tygar, J. D. and Alma Whitten. "Why Johnny can't encrypt: A Usability Evaluation of PGP 5.0." Proceedings of the 8th Conference on USENIX Security Symposium - Volume 8, SSYM'99: 14-14. USENIX Association Berkeley, CA, USA. 1999. Also available at http://dl.acm.org/citation.cfm?id=1251421.1251435.
Zimmermann, Philip R. PGP Source Code and Internals. MIT Press, Cambridge, MA, USA. 1995.
Zimmermann, Philip R. The Official PGP User's Guide. MIT Press, Cambridge, MA, USA. 1995.
Alexander, Chris and Ian Goldberg. "Improved User authentication in Off-the-Record Messaging." Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society, WPES '07: 41-47, New York, NY, USA. ACM. 2007. Also available at http://doi.acm.org/10.1145/1314333.1314340.
Borisov, Nikita, Eric Brewer, and Ian Goldberg. "Off-the-Record Communication, or, Why not to use PGP." Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, WPES '04: 77-84, New York, NY, USA. ACM 2004. Also available at http://doi.acm.org/10.1145/1029179.1029200.
Cruise, Brit. "Walkthrough of Diffie-Gellman Key Exchange." Accessed September 3, 2014. https://www.khanacademy.org/computing/computer-science/cryptography/modern-crypt/v/diffie-hellman-key-exchange—part-2.
EggHEADS.ORG. "Eggdrop." Accessed September 3, 2014. http://www.eggheads.org/.
EmacsWiki. "ERC Basics." Accessed September 3, 2014. http://www.emacswiki.org/emacs/ErcBasics.
fellowship. "Join FSFE's Community." Accessed September 3, 2014. https://fsfe.org/fellowship/index.en.html.
Google. "What is Google Talk?." Accessed September 3, 2014. https://developers.google.com/talk/. 2013.
Gutmann, Peter. Everything you Never Wanted to Know about PKI but were Forced to Find Out. Accessed September 3, 2014. https://www.cs.auckland.ac.nz/~pgut001/pubs/pkitutorial.pdf.
Hill, Benjamin. "Google has Most of my Email Because it Has All of Yours." Accessed September 3, 2014. http://mako.cc/copyrighteous/google-has-most-of-my-email-because-it-has-all-of-yours. 2014.
IRC Help. "An IRC Tutorial." Accessed September 3, 2014. http://www.irchelp.org/irchelp/irctutorial.html.
irssi. "Irssi IRC Client." Accessed September 3, 2014. http://www.irssi.org/.
Khan Academy. "XOR Bitwise Operation." Accessed September 3, 2014 https://www.khanacademy.org/computing/computer-science/cryptography/ciphers/a/xor-bitwise-operation.
OAuth. Accessed September 3, 2014. http://oauth.net/.
Rasata, Jeanne. Free Software Foundation. "Associate Member Benefits." Accessed September 3, 2014. https://www.fsf.org/associate/benefits. 2012.
ZNC Wiki. "ZNC." Accessed September 3, 2014. http://wiki.znc.in/ZNC.