Index
A
- Adafruit library
- additional background information
- finding / Finding additional background information
- additional cryptography resources, finding / Finding additional cryptography resources
- additional electronics resources, finding / Finding additional electronics resources
- additional Debian resources, finding / Finding additional Debian resources
- additional cryptography resources
- additional Debian resources
- finding / Finding additional Debian resources
- additional electronics resources
- finding / Finding additional electronics resources
- Advanced Encryption Standard (AES)
- advantages, hardware-based cryptography
- offloading computation, to separate processor / Offloading computation to a separate processor
- keys, protecting through physical isolation / Protecting keys through physical isolation
- AES in counter-mode (AES-CTR)
- air-gap
- about / Mitigating the identified risks
- Analog-to-Digital Converter (ADC) / Designing the BeagleBridge circuit
- Analog-to-Digital Converters (ADCs) / Introducing the BBB
- Arduino shields
- about / Touring the CryptoCape
- ATAES132
- EEPROM data, encrypting with / Encrypting EEPROM data with the ATAES132
- references, for documentation / Encrypting EEPROM data with the ATAES132
- ATECC108
- about / Providing hardware authentication with ATSHA204 and ATECC108
- used, for providing hardware authentication / Providing hardware authentication with ATSHA204 and ATECC108
- references / Providing hardware authentication with ATSHA204 and ATECC108
- ATmega328p
- about / Combining the BBB with an ATmega328p
- BBB, combining with / Combining the BBB with an ATmega328p
- at rest
- ATSHA204
- about / Providing hardware authentication with ATSHA204 and ATECC108
- used, for providing hardware authentication / Providing hardware authentication with ATSHA204 and ATECC108
- references / Providing hardware authentication with ATSHA204 and ATECC108
- authentication
- authorization framework
B
- &bitlbee channel / Creating a BitlBee account, Chatting with BitlBee
- bandwidth
- determining, with speedtest-cli / Determining your bandwidth with speedtest-cli
- bandwidth usage
- tuning, of bridge / Tuning the bandwidth usage of your bridge
- BBB
- about / Introducing the BBB
- unboxing / Unboxing the BBB and providing power
- power, providing / Unboxing the BBB and providing power
- Tor, installing on / Installing Tor on BBB
- Tor, configuring for / Configuring Tor for BBB
- combining, with ATmega328p / Combining the BBB with an ATmega328p
- GPG key, installing on / Generating GPG keys
- BBB's commitment
- appreciating, to OSHW / Appreciating BBB's commitment to open source hardware
- BBB, with TRAMP
- commands, running from Emacs / Running commands from Emacs
- Emacs dired, used for copying files / Using Emacs dired to copy files to and from BBB
- BeagleBoard.org
- URL, for mailing list / Creating the cape DTS file
- BeagleBoard website
- URL / Introducing the BBB
- BeagleBone
- used, for protecting online chats / Using the BeagleBone to protect your online chats
- BitlBee, installing on / Installing BitlBee on the BeagleBone
- BeagleBone Python library
- BeagleBridge circuit
- designing / Designing the BeagleBridge circuit
- Bill Of Materials (BOM) / Appreciating BBB's commitment to open source hardware
- BitlBee
- about / Installing BitlBee on the BeagleBone
- installing, on BeagleBone / Installing BitlBee on the BeagleBone
- account, creating / Creating a BitlBee account
- Google Talk account, adding to / Adding a Google Talk account to BitlBee
- URL, for front page / Adding a Google Talk account to BitlBee
- jabber account, adding to / Adding a Jabber account to BitlBee
- contacts, managing in / Managing contacts in BitlBee
- chatting with / Chatting with BitlBee
- BitlBee server
- OTR, adding to / Adding OTR to your BitlBee server
- Boris
- about / Touring the CryptoCape
- Bouncer
- IRC connections, marshalling with / Marshalling your IRC connections with a Bouncer
- bridge
- controlling, with Stem library / Controlling the bridge with the Stem library
- bridge-specific settings
- BridgeRelay / Setting bridge-specific settings
- ServerTransportPlugin / Setting bridge-specific settings
- ExtORPort / Setting bridge-specific settings
- BridgeRelay setting
- about / Setting bridge-specific settings
- bridges, Tor / Understanding Tor bridges
- buffer overrun
- Bunnie's blog
- URL / Extending a PCR
C
- cape DTS file
- creating / Creating the cape DTS file
- cape EEPROM
- benefits / Understanding the benefit of cape EEPROMs
- cape EEPROMs
- creating / Creating a cape EEPROM
- capemgr
- capes
- about / Touring the CryptoCape
- certificate pinning
- about / Adding OTR to your ZNC server
- Chaos Computer Club (CCC)
- Chaos Computer Club (CCC)
- chatting, with BitlBee / Chatting with BitlBee
- chatting, with OTR in BitlBee
- about / Chatting with OTR in BitlBee
- Socialist Millionaire Problem / Understanding the Socialist Millionaire Problem
- Classless Inter-Domain Routing (CIDR) / Discovering the IP address of your networked BBB
- clocks
- synchronizing, throughout system / Keeping time with a real-time clock
- commands
- running, from Emacs / Running commands from Emacs
- components, CryptoCape
- AT97SC3205T / Touring the CryptoCape
- ATAES132 / Touring the CryptoCape
- ATSHA204 / Touring the CryptoCape
- ATECC108 / Touring the CryptoCape
- ATmega328p / Touring the CryptoCape
- CAT24C256 / Touring the CryptoCape
- DS3231M / Touring the CryptoCape
- Computer-Aided Design (CAD) / Appreciating BBB's commitment to open source hardware
- computing devices
- trusting, with Trusted Platform Module (TPM) / Trusting computing devices with a Trusted Platform Module
- configuration, Tor
- for BBB / Configuring Tor for BBB
- Configuration Changed event
- contacts
- managing, in BitlBee / Managing contacts in BitlBee
- Counter with CBC-MAC (CCM) / Encrypting EEPROM data with the ATAES132
- crypto accelerators, AM335x
- CryptoCape
- about / Touring the CryptoCape
- components / Touring the CryptoCape
- keypad, connecting to / Adding the keypad
- references / Taking ownership of the TPM
- CryptoCape page
- CryptoCape v02 / Taking ownership of the TPM
- cryptography
- Cygwin
- cypherpunks
- about / Reflecting on the Crypto Wars
D
- Denial-Of-Service (DOS)
- development repository
- Tor, installing from / Installing Tor from the development repository
- Device Tree Source (DTS) / Understanding the benefit of cape EEPROMs
- device tree system, Linux kernel
- URL, for presentation / Creating the cape DTS file
- Differential Power Analysis (DPA) / Exposing hardware-specific attack vectors
- Diffie-Hellman Key-Exchange protocol
- Diffie-Hellman Key Exchange
- reference / Introducing Off-the-Record communication
- dired
- about / Connecting to BBB with TRAMP
- disadvantages, hardware-based cryptography
- lacking cryptographic flexibility / Lacking cryptographic flexibility
- hardware-specific attack vectors, exposing / Exposing hardware-specific attack vectors
- obfuscating implementation details / Obfuscating implementation details
- DTS file, CryptoCape Revision 00A0
- Dynamic Host Configuration Protocol (DHCP) / Discovering the IP address of your networked BBB
E
- EEPROM
- EEPROM cape generator
- URL / Creating a cape EEPROM
- EEPROM data
- encrypting, with ATAES132 / Encrypting EEPROM data with the ATAES132
- Eggdrop
- URL / Extending the project
- electricity and magnetism
- Electronic Frontier Foundation (EFF)
- about / Creating a good gpg.conf file
- reference / Creating a good gpg.conf file
- eLinux wiki site
- creating / Creating an eLinux wiki site
- Elliptical Curve Digital Signature Algorithm (ECDSA) / Providing hardware authentication with ATSHA204 and ATECC108
- Emacs
- embedded development environment, creating with / Creating an embedded development environment with Emacs
- about / Learning how to learn about Emacs
- commands, running from / Running commands from Emacs
- Emacs 24
- installing / Installing Emacs 24
- Emacs dired
- used, for copying files / Using Emacs dired to copy files to and from BBB
- Emacs newbie
- Email Self-Defense guide
- reference / Generating GPG keys
- embedded development environment
- creating, with Emacs / Creating an embedded development environment with Emacs
- complications / Understanding the complications of embedded development
- Emacs 24, installing / Installing Emacs 24
- prelude, installing / Installing the prelude
- Emacs, learning / Learning how to learn about Emacs
- SSH connections, streamlining / Streamlining the SSH connections
- BBB, connecting with TRAMP / Connecting to BBB with TRAMP
- Embedded Multi-Media Card (eMMC) / Introducing the BBB
- enrollment
- about / Preparing the fingerprint sensor
- Entropy
- generating / Generating entropy
- Exclusive-OR (XOR) / Introducing Off-the-Record communication
- exit policies, Tor
- about / Understanding Tor exit policies
- ExtORPort setting
- about / Setting bridge-specific settings
F
- fingerprint biometrics
- limitations, appreciating / Appreciating the limitations of fingerprint biometrics
- fingerprint sensor
- overview / The fingerprint sensor overview
- freenode
- about / The modern uses of IRC
- Fritzing diagram / Designing the BeagleBridge circuit
- FSF sites
G
- General Purpose IO (GPIO) / Introducing the BBB
- glitch attack
- Globe
- GNU debugger (GDB) / Understanding the complications of embedded development
- GNU Privacy Guard (GPG)
- about / Creating a cape EEPROM
- Google Talk account
- adding, to BitlBee / Adding a Google Talk account to BitlBee
- GPG
- about / Reflecting on the Crypto Wars
- using / Using GPG
- gpg-agent
- about / Iterating on the threat model
- gpg.conf
- reference / Creating a good gpg.conf file
- GPG key
- installing, on BBB / Generating GPG keys
- Entropy, generating / Generating entropy
- good gpg.conf, creating / Creating a good gpg.conf file
- generating / Generating the key
- postgeneration maintenance / Postgeneration maintenance
- reference / Postgeneration maintenance
- unlocking, at startup / Unlocking your key at startup
- GPG key protection, with TPM
- about / Protecting your GPG key with a TPM
- trusted computing, introducing / Introducing trusted computing
- data, encrypting to PCR state / Encrypting data to a PCR state
- Graphical User Interface (GUI)
- about / Reflecting on the Crypto Wars
- Graphical User Interfaces (GUIs) / Understanding the complications of embedded development
H
- hardware-based cryptography
- hardware authentication
- providing, with ATSHA204 / Providing hardware authentication with ATSHA204 and ATECC108
- providing, with ATECC108 / Providing hardware authentication with ATSHA204 and ATECC108
- Hardware Security Modules (HSMs)
- hardware versus software debate
- summarizing / Summarizing the hardware versus software debate
- Hardware Volatile Entropy Gathering and Expansion (HAVEGE) / Generating entropy
- Hash Based Message Authentication Codes (HMAC) / Providing hardware authentication with ATSHA204 and ATECC108
- heartbleed
- hidden service
- history, PGP
- about / History of PGP
- reflecting, on Crypto wars / Reflecting on the Crypto Wars
- HTTPS Everywhere
- Hypertext Transfer Protocol Secure (HTTPS)
I
- I2C bus specification
- I2C protocol
- about / Discovering the I2C protocol
- In-System Programming (ISP)
- Input/Output (IO) / Introducing the BBB
- installation, BitlBee
- on BeagleBone / Installing BitlBee on the BeagleBone
- installation, IRC bouncer ZNC / Downloading and installing the IRC bouncer ZNC
- installation, Tor
- on BBB / Installing Tor on BBB
- from development repository / Installing Tor from the development repository
- installing, GPG key
- on BBB / Generating GPG keys
- Instant Message (IM) / On the usability of OTR
- Integrated Development Environment (IDE) / Creating an embedded development environment with Emacs
- International Traffic in Arms Regulations (ITAR) / History of PGP
- Internet Protocol (IP)
- about / Learning about Tor
- Internet Service Provider (ISP)
- about / Learning about Tor
- IP address
- discovering, of networked BBB / Discovering the IP address of your networked BBB
- IRC
- modern usage / The modern uses of IRC
- IRC bot
- about / Extending the project
- IRC bouncer ZNC
- downloading / Downloading and installing the IRC bouncer ZNC
- installing / Downloading and installing the IRC bouncer ZNC
- IRC client
- ZNC, connecting to from / Connecting to ZNC from your IRC client
- IRC connections
- marshalling, with Bouncer / Marshalling your IRC connections with a Bouncer
- managing, ZNC configuration used / Configure ZNC to manage your IRC connections
- irssi
J
- jabber account
- adding, to BitlBee / Adding a Jabber account to BitlBee
K
- key isolation features, CryptoCape / Touring the CryptoCape
- keypad
- adding / Adding the keypad
- references / Adding the keypad
- connecting, to CryptoCape / Adding the keypad
- key protection system
- overview / Outlining the key protection system
- keyserver pool
- about / Creating a good gpg.conf file
L
- Lavabit service
- about / Reflecting on the Crypto Wars
- reference / Reflecting on the Crypto Wars
- Light-Emitting Diode (LED)
- Light emitting Diodes (LEDs) / Unboxing the BBB and providing power
- limitations, Tor / Realizing the limitations of Tor
- linkage attack
- about / Learning about Tor
- Liquid-crystal Display (LCD) / Unboxing the BBB and providing power
- Liquid Crystal Display (LCD)
- logic analyzer
- about / Discovering the I2C protocol
- logic bugs
- about / Summarizing our threat model
- logic supply
- references / Adding the keypad
- Low Pin Count (LPC)
- lurk
- about / The modern uses of IRC
M
- Man-In-The-Middle (MITM) attack / Chatting with OTR in BitlBee
- Message Authentication Codes (MACs) / Introducing Off-the-Record communication
- Mythbusters
N
- netiquette / The modern uses of IRC
- networked BBB
- IP address, discovering of / Discovering the IP address of your networked BBB
- networks
- adding, to ZNC / Adding your networks to ZNC
- Network Time Protocol (NTP) / Installing Tor from the development repository
- Nix Craft article
O
- OAuth
- Obfsproxy
- obfuscated bridge
- connecting to / Connecting to your obfuscated bridge
- obfuscated proxies
- Off-the-Record (OTR)
- about / Summary, Introducing Off-the-Record communication
- communicating / Communicating Off-the-Record – a background
- usability / On the usability of OTR
- off-the-record communication
- oftc
- about / The modern uses of IRC
- onion analogy
- about / Learning about Tor
- onion logo
- onion routing
- about / Learning about Tor
- features / Learning about Tor
- online chats
- protecting, BeagleBone used / Using the BeagleBone to protect your online chats
- OpenPGP
- reference / Creating a good gpg.conf file
- OSHW
- BBB's commitment, appreciating to / Appreciating BBB's commitment to open source hardware
- URL / Appreciating BBB's commitment to open source hardware
- OSHW Association (OSHWA) / Appreciating BBB's commitment to open source hardware
- OTR
- adding, to BitlBee server / Adding OTR to your BitlBee server
- adding, to ZNC server / Adding OTR to your ZNC server
- OTR connections
- establishing, through ZNC / Establishing OTR connections through ZNC
P
- password-less login
- configuring / Configuring password-less login
- paste service, Debian
- URL / The modern uses of IRC
- PCR
- about / Introducing trusted computing
- extending / Extending a PCR
- PGP
- history / History of PGP
- about / Reflecting on the Crypto Wars
- physical interfaces, adding to bridge
- about / Adding physical interfaces to the bridge
- front panel components, gathering / Gathering the front panel components
- LCD, used for displaying status information / Using an LCD to display status information
- bandwidth, controlling with potentiometer / Controlling the bandwidth with a potentiometer
- BeagleBridge circuit, designing / Designing the BeagleBridge circuit
- hardware, wiring with proto cape / Wiring the hardware with a proto cape
- software, developing with Python libraries / Developing the software using Python libraries
- hardware, controlling with pyBBIO / Controlling the hardware with pyBBIO
- pin entry programs / Iterating on the threat model
- ping scan / Discovering the IP address of your networked BBB
- pin muxing
- PKI
- pluggable transport
- pluggable transports
- pocket programmer, SparkFun / Combining the BBB with an ATmega328p
- port forwarding
- enabling / Enabling port forwarding
- potentiometer
- prelude
- URL / Installing Emacs 24
- installing / Installing the prelude
- Pretty Good Privacy (PGP)
- about / Summary
- production files, BBB
- project
- extending / Extending the project
- Pulse Width Modulators (PWM) / Introducing the BBB
R
- Real Time Clock (RTC) / Installing Tor from the development repository
- relays, Tor / Understanding Tor relays
- rng-tools package / Generating entropy
S
- ScrambleSuit obfsproxy
- URL, for bridge configuration / Setting bridge-specific settings
- sealing
- about / Encrypting data to a PCR state
- Secure Shell (SSH) / Understanding the complications of embedded development
- Serial Clock (SCL) / Discovering the I2C protocol
- Serial Data (SDA) / Discovering the I2C protocol
- serial debugging cable
- ServerTransportPlugin setting
- about / Setting bridge-specific settings
- session keys
- Socialist Millionaire Problem
- SparkFun
- URL / Using an LCD to display status information
- about / Controlling the hardware with pyBBIO
- URL, for tutorials / Controlling the hardware with pyBBIO
- SparkFun Electronics
- speedtest-cli
- bandwidth, determining with / Determining your bandwidth with speedtest-cli
- SSH agent
- running, for controlling access to SSH keys / Running an SSH agent to control access to your SSH keys
- SSH configuration file
- editing / Editing the SSH configuration file
- SSH connections
- streamlining / Streamlining the SSH connections
- IP address, discovering of networked BBB / Discovering the IP address of your networked BBB
- SSH configuration file, editing / Editing the SSH configuration file
- password-less login, configuring / Configuring password-less login
- SSH agent, running to control access to SSH keys / Running an SSH agent to control access to your SSH keys
- Stem library
- about / Installing Tor from the development repository
- URL / Developing the software using Python libraries
- used, for controlling bridge / Controlling the bridge with the Stem library
- references, for online documentation / Controlling the bridge with the Stem library
- Storage Root Key (SRK)
- about / Taking ownership of the TPM
- System Reference Manual (SRM) / Introducing the BBB
T
- 30th Chaos Communication Congress (30C3) / Extending a PCR
- Tails
- Texas Instruments (TI)
- threat identification
- about / Threat identification
- threat model
- developing / Developing a threat model
- key protection system, outlining / Outlining the key protection system
- assets, identifying for protection / Identifying the assets we need to protect
- risks, identifying / Identifying the risks
- URL, for Microsoft report / Identifying the risks
- identified risks, mitigating / Mitigating the identified risks
- summarizing / Summarizing our threat model
- iterating on / Iterating on the threat model
- threat modeling
- Tor
- about / Learning about Tor
- users appreciation / Appreciating the various users of Tor
- limitations / Realizing the limitations of Tor
- URL / Realizing the limitations of Tor
- installing, on BBB / Installing Tor on BBB
- installing, from development repository / Installing Tor from the development repository
- configuring, for BBB / Configuring Tor for BBB
- Tor, configuring for BBB
- about / Configuring Tor for BBB
- contact details, adding to torrc file / Adding contact details to the torrc file
- bandwidth usage, tuning of bridge / Tuning the bandwidth usage of your bridge
- Tor-related projects
- continuing with / Continuing with Tor-related projects
- Tor atlas
- Tor bridge
- benefits / The impact and benefits of running a Tor bridge
- impacts / The impact and benefits of running a Tor bridge
- bandwidth usage, tuning of / Tuning the bandwidth usage of your bridge
- starting / Starting your new Tor bridge
- Tor bridges
- about / Understanding Tor bridges
- Tor exit policies
- about / Understanding Tor exit policies
- Tor network
- about / Learning about Tor
- Tor project
- URL, for FAQ / Understanding Tor exit policies
- Tor Project
- torrc file
- about / Configuring Tor for BBB
- contact details, adding to / Adding contact details to the torrc file
- Tor relays
- about / Understanding Tor relays
- TPM
- ownership, taking of / Taking ownership of the TPM
- TRAMP
- BBB, connecting with / Connecting to BBB with TRAMP
- Transmission Control Protocol (TCP)
- about / Learning about Tor
- Transport Layer Security (TLS)
- Trusted Computing Group (TCG) / Trusting computing devices with a Trusted Platform Module
- about / Introducing trusted computing
- Trusted Computing Group Software Stack (TSS)
- Trusted Platform Module (TPM)
- about / Trusting computing devices with a Trusted Platform Module, Protecting your GPG key with a TPM
- computing devices, trusting with / Trusting computing devices with a Trusted Platform Module
- two-factor biometric system
- building / Building a two-factor biometric system
- fingerprint sensor overview / The fingerprint sensor overview
- limitations, appreciating of fingerprint biometrics / Appreciating the limitations of fingerprint biometrics
- CryptoCape, preparing / Preparing the CryptoCape
- connections, preparing / Preparing the connections
- Fingerprint scanner, connecting to CryptoCape / Connecting the Scanner to the CryptoCape
- fingerprint sensor, preparing / Preparing the fingerprint sensor
- biometric detection sketch, updating / Uploading the biometric detection sketch
- security analysis / Security analysis of the biometric system
U
- users appreciation, Tor / Appreciating the various users of Tor
- users spike, Turkey
- URL, for graph / Appreciating the various users of Tor
V
- viper mode
- VirtualBox
- virtual user
W
- Web-of-Trust, GPG Privacy Handbook
- reference / Postgeneration maintenance
X
- xkcd comic
- xobs
- about / Extending a PCR
Z
- zero-knowledge proof
- ZNC
- networks, adding to / Adding your networks to ZNC
- connecting to, from IRC client / Connecting to ZNC from your IRC client
- OTR connections, establishing through / Establishing OTR connections through ZNC
- ZNC configuration
- used, for managing IRC connections / Configure ZNC to manage your IRC connections
- ZNC server
- OTR, adding to / Adding OTR to your ZNC server