In this blog post, I’ll show how to integrate Google Authenticator into a Yocto system to enhance the security of remote login flows.
Continue reading...embedded linux
Yocto Hardening: File System Encryption with fscrypt
Let’s continue encryption with the second part and move on to file system encryption.
Continue reading...The First Steps With Buildroot
This text contains instructions on how to get started with Buildroot and some first impressions from a long-time Yocto developer.
Continue reading...Yocto Hardening: IMA and EVM
Let’s continue measuring where we left off, move from the bootloader side to the kernel world, and try out the IMA, integrity measurement subsystem in Linux.
Continue reading...Yocto Hardening: Measured Boot
So far we have mostly been focusing on hardening the kernel and userspace, but this time we will zoom out a bit and take a look at securing the entire system.
Continue reading...Aioli Audiostreamer: Music To The People
Instead of getting the streaming working robustly, I chose to add a Bluetooth connection between the Raspberry Pi and an external audio source.
Continue reading...