What this book covers
Chapter 1, Creating Your BeagleBone Black Development Environment, starts the journey by showing you how to set up Emacs to maximize your embedded hacking.
Chapter 2, Circumventing Censorship with a Tor Bridge, walks through how to transform the BeagleBone Black into a Tor server with a front panel interface.
Chapter 3, Adding Hardware Security with the CryptoCape, investigates biometric authentication and specialized security chips.
Chapter 4, Protecting GPG Keys with a Trusted Platform Module, shows you how to use the BeagleBone Black to safeguard e-mail encryption keys.
Chapter 5, Chatting Off-the-Record, details how to run an IRC gateway on the BeagleBone Black to encrypt instant messaging.
Appendix, Selected Bibliography, lists the referenced works cited throughout the book.