Summary
In this chapter, you learned how to use another privacy tool, OTR. We used OTR with two different applications and examined how OTR authentication works. We also have our BBB set up to act as an IRC gateway to our chat networks and to manage all of our IRC communication.
In this book, we've taken three of the most popular and well-respected privacy and security applications and used them on the BeagleBone Black. The small form factor, low power consumption, and extendibility of the BBB makes it an ideal privacy aid. The software and hardware used in this book makes heavy use of cryptography, which is inherently a social and often controversial technology. We've also learned some of modern cryptography's social-political struggles along the way. Finally, you don't need to be a secret agent to communicate privately and securely; the best tools are freely available. You can improve these tools by using them and providing your feedback to the developers.
Happy hacking...