Free Sample
+ Collection

BeagleBone for Secret Agents

Josh Datko

Browse anonymously, communicate secretly, and create custom security solutions with open source software, the BeagleBone Black, and cryptographic hardware
RRP $14.99
RRP $24.99
Print + eBook

Want this title & more?

$12.99 p/month

Subscribe to PacktLib

Enjoy full and instant access to over 2000 books and videos – you’ll find everything you need to stay ahead of the curve and make sure you can always get the job done.

Book Details

ISBN 139781783986040
Paperback162 pages

About This Book

  • Interface with cryptographic hardware to add security to your embedded project, securing you from external threats.
  • Use and build applications with trusted anonymity and security software like Tor and GPG to defend your privacy and confidentiality.
  • Work with low level I/O on BeagleBone Black like I2C, GPIO, and serial interfaces to create custom hardware applications.

Who This Book Is For

If you have some experience with the BeagleBone or similar embedded systems and want to learn more about security and privacy, this book is for you. Alternatively, if you have a security and privacy background and want to learn more about embedded development, this book is for you. You should have some familiarity with Linux systems and with the C and Python programming languages.

Table of Contents

Chapter 1: Creating Your BeagleBone Black Development Environment
Introducing the BBB
Creating an embedded development environment with Emacs
Finding additional background information
Chapter 2: Circumventing Censorship with a Tor Bridge
Learning about Tor
Installing Tor on BBB
Understanding Tor exit policies
Setting bridge-specific settings
Starting your new Tor bridge
Enabling port forwarding
Adding physical interfaces to the bridge
Determining your bandwidth with speedtest-cli
Controlling the bridge with the Stem library
Connecting to your obfuscated bridge
Continuing with Tor-related projects
Chapter 3: Adding Hardware Security with the CryptoCape
Exploring the differences between hardware and software cryptography
Touring the CryptoCape
Discovering the I2C protocol
Understanding the benefit of cape EEPROMs
Creating an eLinux wiki site
Keeping time with a real-time clock
Trusting computing devices with a Trusted Platform Module
Providing hardware authentication with ATSHA204 and ATECC108
Encrypting EEPROM data with the ATAES132
Combining the BBB with an ATmega328p
Building a two-factor biometric system
Chapter 4: Protecting GPG Keys with a Trusted Platform Module
History of PGP
Developing a threat model
Generating GPG keys
Protecting your GPG key with a TPM
Adding the keypad
Taking ownership of the TPM
Extending a PCR
Unlocking your key at startup
Iterating on the threat model
Chapter 5: Chatting Off-the-Record
Communicating Off-the-Record – a background
Installing BitlBee on the BeagleBone
Adding OTR to your BitlBee server
Marshalling your IRC connections with a Bouncer
Extending the project

What You Will Learn

  • Build a complete BeagleBone development environment with Emacs and modern Emacs extensions
  • Understand how Tor protects Internet privacy and how to run a Tor bridge
  • Add custom hardware to the BeagleBone's I2C, serial, GPIO, and analog to digital interfaces
  • Gain insight into the BeagleBone cape ecosystem by exploring the design of the CryptoCape
  • Use a Trusted Platform Module to protect your GPG keys
  • Build an Off-the-Record chat gateway
  • Develop and analyze threat models for security-related projects

In Detail

The BeagleBone Black is a small but powerful low-powered computer that can be used to protect personal secrets and enable privacy enhancing technologies. With increasing concerns over Internet surveillance, you can combine time-tested open source security software with the small form factor of the BeagleBone Black to create custom personal security applications.

Starting with an introduction to development with the BeagleBone Black, we'll show you how to use the BeagleBone to create custom hardware projects involving security and privacy. Each chapter provides the history and background of each technology with a self-contained and practical project. You'll explore devices such as a fingerprint scanner and the Trusted Platform Module on the CryptoCape while learning about authentication and encryption. Filled with projects that utilize security tools used by journalists, activists, and government agents, this book shows you how to apply these tools with a BeagleBone Black.


Read More