Table of Contents
- BeagleBone Black Basics
- Proteting Anonymity with a Tor Relay
- Custom Crypto Hardware with the Crypto Cape
- Build a hardware GPG Wallet
- Authenticating a BeagleBone Wireless Sensor Network
- Appendix I
Browse anonymously, communicate secretly, and create custom security solutions with open source software, the BeagleBone Black, and cryptographic hardware