This Tuesday, I’m on a panel with John Hawley, the community manager of the MinnowBoard Max, where we’ll be discussing the future of open source hardware. Spoilers, I think the future looks good. With the panel upcoming, I decided to dust off my MinnowBoard Max (MBM) for a little project–I wanted to run Tails on the device.
My book, BeagleBone for Secret Agents, is now available. The title is slightly misleading as you need not be a secret agent to enjoy this book. 😉 There are five self-contained projects involving electronics, cryptography, and various software packages but I wanted to write a book that was more than just a collection of projects. In BBfSa, I tried to motivate the social and individual importance of using software like Tor, GPG, and OTR. While the projects are cool, IMHO, I’m hoping that readers will appreciate the need for and difficulty of developing privacy enhancing technologies.
I picked projects that were explicitly more detailed than one could describe in a blog post. Most of them combine hardware and software and I would describe the projects as challenging, but attainable. If you decide to buy it hopefully you not only enjoy it, but learn something as well.
The book is available as a DRM free eBook and as a bound collection of printed dead-trees. I’ve stopped reading with eBooks readers, but there are just over 100 references, most with URLs, and I can appreciate the convenience of using one. You can visit my BBfSa page to see its availability or buy it direct from Packt Publishing.
Thanks to the many people at Packt who helped with the direction, editing, and layout. I was lucky to have very talented reviewers. Lastly, thank you Nate for writing an incredibly insightful forward and to SparkFun, without whom the projects in this book would not have been possible.
My initial reaction to Banned Books Week, which is this week, was “oh, this when we remember how we used to ban books back in the 50s.” I went to the Banned Books Week website and found a pamphlet that shows the banned or challenged books, in 2013! Looking over the list, I’m incredulous that books like the Margaret Atwood’s Handmaid’s Tale, and Diary of Anne Frank, which a Northville, Michigan middle school try to ban, are still routinely challenged.
I have been running a Tor relay on a BeagleBone Black since last August. It’s been reset twice. Once after Heartbleed, which effectively destroyed the uptime calculation since it looks like a new relay. The other was when I accidentally unplugged it.
I was selected to talk at the Hackers on Planet Earth (HOPE) conference this July 18th-20th in NYC! The talk is Friday, 9pm, in Olson. I’m honored and super excited to tell everybody about the Open Source Hardware hacking I’ve been doing for the last few months. I attended HOPE 9 and it was filled with some very high quality talks; too many to attend. I’m absolutely thrilled to be on the speaker list.
The title of my talk is: Crypto for Makers: Projects for the BeagleBone, Pi, and AVRs and below is the summary which I submitted. If you have been following my blog, or my company, you should have a pretty good idea of what I’m going to talk about.
The main conference website is here and you can still buy tickets here. The keynote speaker is Daniel Ellsberg, the man behind the Pentagon Papers. I hope I don’t have to speak in his time slot. See you in NYC!
As more devices join the Internet of Things, it is increasingly important that these devices remain protected from surveillance and compromise. This talk will show how to add specialized, commercially available, crypto Integrated Circuits (ICs) to improve the security of your BeagleBone, Pi, or AVR based platform. ICs such as a Trusted Platform Module, I2C authentication chips, and hardware random number generators will be discussed. The CryptoCape, an Open Source Hardware daughterboard, made in collaboration between SparkFun Electronics and Josh, will be presented in detail. Lastly, this talk will describe the experience of running a Tor relay on a BeagleBone Black for over 200 days.
I will also have a booth at the Denver Mini-Maker Faire in early May if you are in the area.
I run a Tor relay on my home network on a BeagleBone Black. It’s certainly not the fastest Tor relay out there, but it’s inexpensive, small, and doesn’t affect my home network. But more importantly, it allows users who are censored to access the Internet and the Tor project helps protect privacy online. The Tor project, IMHO, is one of the best open source projects around.
As a non-exit relay, one does not typically encounter many issues as none of the Tor traffic exits my relay to the open Internet. For those seeking a description of Tor traffic, there is a great infographic on the EFF site. Anyway, I tried to watch Family Guy and I was presented this:
All Tor relays have their IP address publicized; this is how Tor clients can find them. There are some exceptions with things called “Bridges,” which I won’t go into any detail here. It’s pretty easy to collect a list of public Tor relays, since well, they are public and simply blacklist all of those IP addresses. Which is what I think is happening here.
I sent the following email to Hulu support; we’ll see if I get a response. There was a response on the Tor-talk mailing. I like Family Guy, but I like Internet freedom more.
I run a non-exit Tor relay on my home network. This allows Internet users, who are censored, to access the Internet and protects users who wish to keep their privacy while online. There is a great description of who uses Tor at: https://www.torproject.org/about/torusers.html.en
As you can tell, my IP is based in the U.S. and I would like to access Hulu. Can you please lift the blacklist on my IP?
I received my Tor t-shirt the other day! One can receive a t-shirt by meeting one of the following criteria (from the Tor Project website):
- A large enough ($65+) donation to the Tor Project.
- Operate a fast Tor relay that’s been running for the past two months: you are eligible if you allow exits to port 80 and you average 100 KBytes/s traffic, or if you’re not an exit but you average 500 KBytes/s traffic.
- Help out in other ways. Maintain a translation. Write a good support program and get a lot of people to use it. Do research on Tor and anonymity, solve some of our bugs, or establish yourself as a Tor advocate.
I run two non-exit relays, one of which is on a remote server and qualified for #2 above. The other is my BeagleBone Black relay, which doesn’t quite meet the traffic requirement but makes up for it in coolness. 😉