Summary
In this first chapter, you will have gained a solid understanding of how an embedded Linux system is defined. We’ve shown you some wide-ranging examples of where embedded Linux systems are leveraged today. Most importantly, we’ve reviewed some critical reasons why having these devices delivered to their customers as securely as possible is mandatory for those building such solutions. In the next chapter, we’ll dive deep into why security starts with a great design.