Content
Read on a page
Travelling with digital devices has sometimes seineTücken. Although a laptop ban could be prevented in aircraft cabins last year, re is a possibility that authorities may want to throw einenBlick into smartphone or computer, especially when border controls are being carried out. As travellers at Bestenihre protect data from involuntary access of border guards, KurtOpsahl and William Budington of Electronic Frontier Foundation (EFF) discussed latest Congress of Chaos Computer Club (CCC) in Leipzig. Advice that users could generally heed for safe handling of ir data and published by EFF specifically for entry into USAbereits.
if ( typeof AdController !== ‘undefined’ !window.Zeit.isMobileView()) { if ( !document.getElementById( ‘iqadtile8’ ) ) { var elem = document.createElement( ‘div’ ); elem.id = ‘iqadtile8’; elem.className = “ad ad-desktop ad-desktop–8 ad-desktop–8-on-article”; elem.setAttribute(‘data-banner-type’, ‘desktop’); elem.setAttribute(‘data-banner-label’, ‘Anzeige’); document.getElementById(‘ad-desktop-8’).parentNode.appendChild(elem); AdController.render(‘iqadtile8’); if ( window.console typeof window.console.info === ‘function’ ) { window.console.info(‘AdController ‘ AdController.VERSION ‘ tile 8 desktop’) } } } if ( typeof AdController !== ‘undefined’ window.Zeit.isMobileView()) { if ( !document.getElementById( ‘iqadtile3’ ) ) { var elem = document.createElement( ‘div’ ); elem.id = ‘iqadtile3’; elem.className = “ad ad-mobile ad-mobile–3 ad-mobile–3-on-article”; elem.setAttribute(‘data-banner-type’, ‘mobile’); document.getElementById(‘ad-mobile-3’).parentNode.appendChild(elem); AdController.render(‘iqadtile3’); if ( window.console typeof window.console.info === ‘function’ ) { window.console.info(‘AdController ‘ AdController.VERSION ‘ tile 3 mobile’) } } }
Spectacular cases such as Hours of review David Miranda, who had been following a meeting with US filmmaker Laura Poitras in conjunction with Snowden revelations at London’s Festgeh Airport, are more of exception. “MaximaleVorsicht” recommend Opsahl and Budington when entering autoritäreStaaten such as Russia, China, Turkey or Middle East. The use of encryption app Bylock was considered a kind of coup attempt in Turkey. But also European states and USA and Canada allow within existing Gesetzedie search of devices at ir limits.
Leave unnecessary equipment at home
The most banal and at same time most important recommendation of two net activists is: “Don’t bring anything! If you don’t have it, you can’t take it away at border. ” Therefore, Manüberlegen should leave his devices at home if y were not necessarily unterwegsbenötigt, said Budington. If this is not possible, Dernormale computer can be replaced by a device that is only used temporarily for dieReise. Instead of your own smartphone, a so-called burner phone can mitgenommenwerden.
But this option does not always exist. Finally, application programs and data are usually available on PersönlichenGeräten, which are also needed on einerGeschäftsreise. Basically, according to Opsahljedoch, travellers should leave only those data on devices that really benötigtwürden. Also, required data could be uploaded to a server before trip to download it again after border crossing.
if ( typeof AdController !== ‘undefined’ !window.Zeit.isMobileView()) { if ( !document.getElementById( ‘iqadtile4’ ) ) { var elem = document.createElement( ‘div’ ); elem.id = ‘iqadtile4’; elem.className = “ad ad-desktop ad-desktop–4 ad-desktop–4-on-article”; elem.setAttribute(‘data-banner-type’, ‘desktop’); elem.setAttribute(‘data-banner-label’, ‘Anzeige’); document.getElementById(‘ad-desktop-4’).parentNode.appendChild(elem); AdController.render(‘iqadtile4’); if ( window.console typeof window.console.info === ‘function’ ) { window.console.info(‘AdController ‘ AdController.VERSION ‘ tile 4 desktop’) } } } if ( typeof AdController !== ‘undefined’ window.Zeit.isMobileView()) { if ( !document.getElementById( ‘iqadtile4’ ) ) { var elem = document.createElement( ‘div’ ); elem.id = ‘iqadtile4’; elem.className = “ad ad-mobile ad-mobile–4 ad-mobile–4-on-article”; elem.setAttribute(‘data-banner-type’, ‘mobile’); document.getElementById(‘ad-mobile-4’).parentNode.appendChild(elem); AdController.render(‘iqadtile4’); if ( window.console typeof window.console.info === ‘function’ ) { window.console.info(‘AdController ‘ AdController.VERSION ‘ tile 4 mobile’) } } } Forensic access also possible at border
But Auchsolche approaches have ir pitfalls, as Budington explained. DennErmittlungsbehörden had a number of ways to access supposedly deleted data or secured devices. Budingtonverwies is based on software of Israeli security company Cellebrite, which can also unlock iphones according to its own specifications.
With help of JTAG interface Könnedie software can also create images of Android devices and extract data. The so-called universal Forensic Extraction Device (UFED) of company is used not only by investigating authorities but also by border officials, said Budington, citing company information.
Because such a file can also recover deleted data, it is necessary to protect it in addition. Budington recommends EineFestplattenverschlüsselung with AES-XTS. However, Verschlüsselungdabei is only as strong as used passphrase. To do so, EFF has developed a passphrase cube that works with letter combinations and word lists.
LautBudington have iOS and Android from version 6.0 on possibility to encrypt DieGeräte. Computers are available with BitLocker (Pro-undEnterprise-Windows), FILEVAULT2 (MacOS) and DM-Crypt (Linux). To prevent so-called DMA attacks or a bypass of lock screen, computers should be shut down Jedochkomplett before border controls.