Skip to content

Traveling Safely

Joe Basirico edited this page Oct 1, 2015 · 1 revision

##Threats

There are all kinds of additional dangers to be concerned with while travelling and accessing your remote files/accounts. You need to be concerned about all areas of security and take extra care in a few close areas.

###Border Crossing Threat

This is not legal advice

If you intend to cross a border with a device that contains sensitive or personal information, recognize that in most countries the border officials do have authorization to search and seize anything that enters the country. This includes cell phones and laptops. There have been a few cases that argue this point a bit but it usually applies to individuals re-entering their own country. As a foreigner entering another country, your devices, generally speaking, don't have very many rights to exemption from search.

###Border Crossing Best Practices

  • Fully encrypt all device's Local Storage with a strong Passphrase.
  • Turn off your devices completely when crossing a border. This will make the device resilient to many other types of attack. If a border official seizes your device in this case, it will be difficult for them to break the encryption. If they wish to search the device, at least now you will have to be present to reveal the encryption passphrase.
  • If you are asked to turn over your passphrase you will have to weigh the choice between your potential refused entry into the country and the risk of having that data turned over.

###Shared Wifi Threat

By norm, hotel or even airport Wifi is among some of the worst wireless networks around for privacy and security. In most cases anyone on these networks can see everyone else's traffic.

###Shared Wifi Best Pratice

  • See the Wireless Networks for more generic wifi security advice
  • Use these networks sparingly and not for any sensitive activity (banking, social media accounts, email).
  • Although it is often expensive, using your cellular data provider instead is a decent alternative.
  • Where possible use a VPN connection to encrypt all your traffic back to your home country/employer.
  • Be diligent to ensure that all traffic is transmitted over a secure channel.

###Kiosk Computer Threats Often hotels put kiosk style computers in lobbies or around the hotel for customers to access. These computers are often poorly managed, cache all traffic history, and have additional monitoring software installed on them.

###Kiosk Computer Best Practices It is not considered safe to perform any of the following actions on a Kiosk computer:

  • Login to anything (banking, social media, email, ANYTHING)
  • Purchase anything, this includes booking excursions online
  • Post any personal information at all
  • Uploading pictures

You may be OK to perform the following:

  • Look for a place to have dinner
  • Print your boarding pass (if you can do it without using email)
  • Visit Facebook / Twitter / Instagram to see if the last kiosk user is still logged in and kindly log them out

##General Safety Tips

  • Consider using Tor if your security and privacy needs are great
  • Wait until you get home to post your pictures (see Social Media)
Clone this wiki locally