Hardware Reference
In-Depth Information
Summary
In this chapter, you learned how to use another privacy tool, OTR. We used OTR with two
different applications and examined how OTR authentication works. We also have our
BBB set up to act as an IRC gateway to our chat networks and to manage all of our IRC
communication.
In this topic, we've taken three of the most popular and well-respected privacy and security
applications and used them on the BeagleBone Black. The small form factor, low power
consumption, and extendibility of the BBB makes it an ideal privacy aid. The software and
hardware used in this topic makes heavy use of cryptography, which is inherently a social
and often controversial technology. We've also learned some of modern cryptography's
social-political struggles along the way. Finally, you don't need to be a secret agent to com-
municate privately and securely; the best tools are freely available. You can improve these
tools by using them and providing your feedback to the developers.
Happy hacking!
Search WWH ::




Custom Search