In the following sections, we'll discuss the advantages and disadvantages of using hardware-based cryptography. The remaining projects in the book will use embedded hardware cryptographic devices, so it's important to know their capabilities and their limitations. Refer to Chapter 1, Creating Your BeagleBone Black Development Environment, for additional resources on cryptography and terms used in this section.
BeagleBone for Secret Agents
By :
BeagleBone for Secret Agents
By:
Overview of this book
Table of Contents (14 chapters)
BeagleBone for Secret Agents
Credits
Foreword
About the Author
About the Reviewers
www.PacktPub.com
Preface
Free Chapter
Creating Your BeagleBone Black Development Environment
Circumventing Censorship with a Tor Bridge
Adding Hardware Security with the CryptoCape
Protecting GPG Keys with a Trusted Platform Module
Chatting Off-the-Record
Index
Customer Reviews