BeagleBone for Secret Agents

Browse anonymously, communicate secretly, and create custom security solutions with open source software, the BeagleBone Black, and cryptographic hardware
Preview in Mapt

BeagleBone for Secret Agents

Josh Datko

1 customer reviews
Browse anonymously, communicate secretly, and create custom security solutions with open source software, the BeagleBone Black, and cryptographic hardware
Mapt Subscription
FREE
$29.99/m after trial
eBook
$10.00
RRP $14.99
Save 33%
Print + eBook
$24.99
RRP $24.99
What do I get with a Mapt Pro subscription?
  • Unlimited access to all Packt’s 5,000+ eBooks and Videos
  • Early Access content, Progress Tracking, and Assessments
  • 1 Free eBook or Video to download and keep every month after trial
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
$0.00
$10.00
$24.99
$29.99 p/m after trial
RRP $14.99
RRP $24.99
Subscription
eBook
Print + eBook
Start 30 Day Trial

Frequently bought together


BeagleBone for Secret Agents Book Cover
BeagleBone for Secret Agents
$ 14.99
$ 10.00
BeagleBone: Creative Projects for Hobbyists Book Cover
BeagleBone: Creative Projects for Hobbyists
$ 63.99
$ 10.00
Buy 2 for $20.00
Save $58.98
Add to Cart

Book Details

ISBN 139781783986040
Paperback162 pages

Book Description

The BeagleBone Black is a small but powerful low-powered computer that can be used to protect personal secrets and enable privacy enhancing technologies. With increasing concerns over Internet surveillance, you can combine time-tested open source security software with the small form factor of the BeagleBone Black to create custom personal security applications.

Starting with an introduction to development with the BeagleBone Black, we'll show you how to use the BeagleBone to create custom hardware projects involving security and privacy. Each chapter provides the history and background of each technology with a self-contained and practical project. You'll explore devices such as a fingerprint scanner and the Trusted Platform Module on the CryptoCape while learning about authentication and encryption. Filled with projects that utilize security tools used by journalists, activists, and government agents, this book shows you how to apply these tools with a BeagleBone Black.

Table of Contents

Chapter 1: Creating Your BeagleBone Black Development Environment
Introducing the BBB
Creating an embedded development environment with Emacs
Finding additional background information
Summary
Chapter 2: Circumventing Censorship with a Tor Bridge
Learning about Tor
Installing Tor on BBB
Understanding Tor exit policies
Setting bridge-specific settings
Starting your new Tor bridge
Enabling port forwarding
Adding physical interfaces to the bridge
Determining your bandwidth with speedtest-cli
Controlling the bridge with the Stem library
Connecting to your obfuscated bridge
Continuing with Tor-related projects
Summary
Chapter 3: Adding Hardware Security with the CryptoCape
Exploring the differences between hardware and software cryptography
Touring the CryptoCape
Discovering the I2C protocol
Understanding the benefit of cape EEPROMs
Creating an eLinux wiki site
Keeping time with a real-time clock
Trusting computing devices with a Trusted Platform Module
Providing hardware authentication with ATSHA204 and ATECC108
Encrypting EEPROM data with the ATAES132
Combining the BBB with an ATmega328p
Building a two-factor biometric system
Summary
Chapter 4: Protecting GPG Keys with a Trusted Platform Module
History of PGP
Developing a threat model
Generating GPG keys
Protecting your GPG key with a TPM
Adding the keypad
Taking ownership of the TPM
Extending a PCR
Unlocking your key at startup
Iterating on the threat model
Summary
Chapter 5: Chatting Off-the-Record
Communicating Off-the-Record – a background
Installing BitlBee on the BeagleBone
Adding OTR to your BitlBee server
Marshalling your IRC connections with a Bouncer
Extending the project
Summary

What You Will Learn

  • Build a complete BeagleBone development environment with Emacs and modern Emacs extensions
  • Understand how Tor protects Internet privacy and how to run a Tor bridge
  • Add custom hardware to the BeagleBone's I2C, serial, GPIO, and analog to digital interfaces
  • Gain insight into the BeagleBone cape ecosystem by exploring the design of the CryptoCape
  • Use a Trusted Platform Module to protect your GPG keys
  • Build an Off-the-Record chat gateway
  • Develop and analyze threat models for security-related projects

Authors

Table of Contents

Chapter 1: Creating Your BeagleBone Black Development Environment
Introducing the BBB
Creating an embedded development environment with Emacs
Finding additional background information
Summary
Chapter 2: Circumventing Censorship with a Tor Bridge
Learning about Tor
Installing Tor on BBB
Understanding Tor exit policies
Setting bridge-specific settings
Starting your new Tor bridge
Enabling port forwarding
Adding physical interfaces to the bridge
Determining your bandwidth with speedtest-cli
Controlling the bridge with the Stem library
Connecting to your obfuscated bridge
Continuing with Tor-related projects
Summary
Chapter 3: Adding Hardware Security with the CryptoCape
Exploring the differences between hardware and software cryptography
Touring the CryptoCape
Discovering the I2C protocol
Understanding the benefit of cape EEPROMs
Creating an eLinux wiki site
Keeping time with a real-time clock
Trusting computing devices with a Trusted Platform Module
Providing hardware authentication with ATSHA204 and ATECC108
Encrypting EEPROM data with the ATAES132
Combining the BBB with an ATmega328p
Building a two-factor biometric system
Summary
Chapter 4: Protecting GPG Keys with a Trusted Platform Module
History of PGP
Developing a threat model
Generating GPG keys
Protecting your GPG key with a TPM
Adding the keypad
Taking ownership of the TPM
Extending a PCR
Unlocking your key at startup
Iterating on the threat model
Summary
Chapter 5: Chatting Off-the-Record
Communicating Off-the-Record – a background
Installing BitlBee on the BeagleBone
Adding OTR to your BitlBee server
Marshalling your IRC connections with a Bouncer
Extending the project
Summary

Book Details

ISBN 139781783986040
Paperback162 pages
Read More
From 1 reviews

Read More Reviews

Recommended for You

IoT: Building Arduino-Based Projects Book Cover
IoT: Building Arduino-Based Projects
$ 63.99
$ 10.00
Raspberry Pi Networking Cookbook - Second Edition Book Cover
Raspberry Pi Networking Cookbook - Second Edition
$ 35.99
$ 10.00
Arduino by Example Book Cover
Arduino by Example
$ 31.99
$ 10.00
Learning Penetration Testing with Python Book Cover
Learning Penetration Testing with Python
$ 39.99
$ 10.00
Raspberry Pi Sensors Book Cover
Raspberry Pi Sensors
$ 23.99
$ 10.00
Cardboard VR Projects for Android Book Cover
Cardboard VR Projects for Android
$ 35.99
$ 10.00