SlideShare a Scribd company logo
1 of 16
The Trump Era
Who am I?
● Chief System Architect of
● I teach Network Security and Linux System
Administration
● Slashdot 08.Feb.2017
US Visitors May Have to Hand
Over Social Media
Passwords: DHS
● Slashdot 12.Feb.2017
US-Born NASA Scientist
Detained At The Border Until
He Unlocked His Phone
● Slashdot 18.May.2017
US and EU Reject Expanding
Laptop Ban To Flights From
Europe
● Slashdot 18.May.2017
US and EU Reject Expanding
Laptop Ban To Flights From
Europe
● What does this actually
mean?
● Now a simple trip to the US becomes threat to
your personal life and company data
● You do not have rights under the US law,
because technically you haven't entered the US
● The DHS agents may decide to copy all your
data, without notifying you.
● By giving away your passwords to the DHS you
may violate the contract with your company and
immediately become liable under the laws of
your own country
● EU privacy laws state that customer data, such
as names, addresses, IDs and so on, should be
stored only on EU soil. If for whatever strange
reason you had left any such data on machine
that is searched by the DHS, you and your
company are liable under EU privacy laws
– EU GDPR
● Why would you unlock your laptop/phone
– you may be detained until you provide your
passwords
– you will miss all your appointments
– you will lose the money for this whole trip
– you will lose potential customers
– miss conference or training
● So what can YOU do?
– encrypt the data on your computer
● cripple on purpose your encrypted storage
● leave the beginning of your encrypted
storage at home or at any other third party,
that you can relay on
● make sure there is NO WAY for YOU to
recover the encrypted data, without that
part, that is NOT with you
● Why would you leave most of your data on the
laptop and only cripple the encrypted storage?
– Internet in the US is actually BAD... VERY BAD
– Downloading 10-15GB of data may not even finish
for one night :(
– leaving most of your data on your PC means faster
restore time
● What to encrypt
– all private data
– browser profile
– emails and email profiles
– all downloads
– all instant messaging logs
– settings of your applications
● If you have a VPN, keep its keys in the
encrypted storage, so DHS would not have
access to them
● It is also a good idea to disable your VPN
keys/accounts while you are traveling to/from
the US.
– setup a simple and effective way to enable your
VPN once you have passed the border control
● Keep all your passwords and keys encrypted
– make sure you can not retrieve them without a third
person that is NOT in the US right now
– this way you will NOT lie to a polygraph test and
you may hope for faster entry in the US
Phone
● Wipe your phone before boarding the flight to
the US
● Remove all facebook/google/slack/twitter and
etc. accounts
● Move all your private data to encrypted SD card
and remove it from your phone before boarding
the flight
– I'm sorry iPhone users... for you, you can backup
everything to the iCloud
● Once you are at the hotel, recover your phone
from your PC
What am I doing
● eCryptfs
● LUKS over a loop device
● Keep all passwords, including the one for the
eCryptfs on the LUKS
● Cripple the LUKS
● My wife has the important 5MB from the image
and she will tell me where she uploaded them
once I enter the US
Thank you!

More Related Content

Viewers also liked

Viewers also liked (14)

Home assistant
Home assistantHome assistant
Home assistant
 
LUG-BG - Kostadin Slavkov - PostgreSQL 10
LUG-BG - Kostadin Slavkov - PostgreSQL 10LUG-BG - Kostadin Slavkov - PostgreSQL 10
LUG-BG - Kostadin Slavkov - PostgreSQL 10
 
Make your internship "worth it"
Make your internship "worth it"Make your internship "worth it"
Make your internship "worth it"
 
How to setup your linux server
How to setup your linux serverHow to setup your linux server
How to setup your linux server
 
Lxd the proper way of runing containers
Lxd   the proper way of runing containersLxd   the proper way of runing containers
Lxd the proper way of runing containers
 
Introduction to python
Introduction to pythonIntroduction to python
Introduction to python
 
Practical my sql performance optimization
Practical my sql performance optimizationPractical my sql performance optimization
Practical my sql performance optimization
 
Why we are migrating to Slackware
Why we are migrating to SlackwareWhy we are migrating to Slackware
Why we are migrating to Slackware
 
Moving your router inside container
Moving your router inside container Moving your router inside container
Moving your router inside container
 
LUG-BG 2017 - Rangel Ivanov - Spread some butter - BTRFS
LUG-BG 2017 - Rangel Ivanov - Spread some butter - BTRFSLUG-BG 2017 - Rangel Ivanov - Spread some butter - BTRFS
LUG-BG 2017 - Rangel Ivanov - Spread some butter - BTRFS
 
Computer vision for your projects
Computer vision for your projectsComputer vision for your projects
Computer vision for your projects
 
Securing the network for VMs or Containers
Securing the network for VMs or ContainersSecuring the network for VMs or Containers
Securing the network for VMs or Containers
 
Performance comparison of Distributed File Systems on 1Gbit networks
Performance comparison of Distributed File Systems on 1Gbit networksPerformance comparison of Distributed File Systems on 1Gbit networks
Performance comparison of Distributed File Systems on 1Gbit networks
 
nftables - the evolution of Linux Firewall
nftables - the evolution of Linux Firewallnftables - the evolution of Linux Firewall
nftables - the evolution of Linux Firewall
 

Similar to Protecting your data when entering the US

Your cell phone is covered in spiders
Your cell phone is covered in spidersYour cell phone is covered in spiders
Your cell phone is covered in spiders
cooperq
 
Freezing Android Bypass
Freezing Android BypassFreezing Android Bypass
Freezing Android Bypass
Matthew Kwong
 
How you can become a hacker with no security experience
How you can become a hacker with no security experienceHow you can become a hacker with no security experience
How you can become a hacker with no security experience
Avădănei Andrei
 

Similar to Protecting your data when entering the US (20)

Securing your digital life - Jason Addie
Securing your digital life -  Jason AddieSecuring your digital life -  Jason Addie
Securing your digital life - Jason Addie
 
Computer Security For Activists & Everyone (Oct 2018)
Computer Security For Activists & Everyone (Oct 2018)Computer Security For Activists & Everyone (Oct 2018)
Computer Security For Activists & Everyone (Oct 2018)
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Don't Diligence Information Security for Lawyers
Don't Diligence Information Security for LawyersDon't Diligence Information Security for Lawyers
Don't Diligence Information Security for Lawyers
 
Hit by a Cyberattack: lesson learned
 Hit by a Cyberattack: lesson learned Hit by a Cyberattack: lesson learned
Hit by a Cyberattack: lesson learned
 
Secure Communication
Secure CommunicationSecure Communication
Secure Communication
 
Your cell phone is covered in spiders
Your cell phone is covered in spidersYour cell phone is covered in spiders
Your cell phone is covered in spiders
 
Mc physics colloquium2018-03-30.-handouts
Mc physics colloquium2018-03-30.-handoutsMc physics colloquium2018-03-30.-handouts
Mc physics colloquium2018-03-30.-handouts
 
Securitytips
SecuritytipsSecuritytips
Securitytips
 
Simple Computer Tips - Screen Shots, Passwords, etc
Simple Computer Tips - Screen Shots, Passwords, etcSimple Computer Tips - Screen Shots, Passwords, etc
Simple Computer Tips - Screen Shots, Passwords, etc
 
Freezing Android Bypass
Freezing Android BypassFreezing Android Bypass
Freezing Android Bypass
 
DSRY_Cybersecurity Awareness Presentation
DSRY_Cybersecurity Awareness PresentationDSRY_Cybersecurity Awareness Presentation
DSRY_Cybersecurity Awareness Presentation
 
Seizing Electronic Evidence & Best Practices – Secret Service
Seizing Electronic Evidence & Best Practices – Secret ServiceSeizing Electronic Evidence & Best Practices – Secret Service
Seizing Electronic Evidence & Best Practices – Secret Service
 
How you can become a hacker with no security experience
How you can become a hacker with no security experienceHow you can become a hacker with no security experience
How you can become a hacker with no security experience
 
Online Privacy & Computer Security Basics (September 2017)
Online Privacy & Computer Security Basics (September 2017)Online Privacy & Computer Security Basics (September 2017)
Online Privacy & Computer Security Basics (September 2017)
 
Digital Security Tips for Hong Kongers
Digital Security Tips for Hong KongersDigital Security Tips for Hong Kongers
Digital Security Tips for Hong Kongers
 
Keeping 'Em Safe: Ways to Protect Your Clients Online
Keeping 'Em Safe: Ways to Protect Your Clients OnlineKeeping 'Em Safe: Ways to Protect Your Clients Online
Keeping 'Em Safe: Ways to Protect Your Clients Online
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
 
Everyday computer tips
Everyday computer tipsEveryday computer tips
Everyday computer tips
 

More from Marian Marinov

More from Marian Marinov (20)

Dev.bg DevOps March 2024 Monitoring & Logging
Dev.bg DevOps March 2024 Monitoring & LoggingDev.bg DevOps March 2024 Monitoring & Logging
Dev.bg DevOps March 2024 Monitoring & Logging
 
Basic presentation of cryptography mechanisms
Basic presentation of cryptography mechanismsBasic presentation of cryptography mechanisms
Basic presentation of cryptography mechanisms
 
Microservices: Benefits, drawbacks and are they for me?
Microservices: Benefits, drawbacks and are they for me?Microservices: Benefits, drawbacks and are they for me?
Microservices: Benefits, drawbacks and are they for me?
 
Introduction and replication to DragonflyDB
Introduction and replication to DragonflyDBIntroduction and replication to DragonflyDB
Introduction and replication to DragonflyDB
 
Message Queuing - Gearman, Mosquitto, Kafka and RabbitMQ
Message Queuing - Gearman, Mosquitto, Kafka and RabbitMQMessage Queuing - Gearman, Mosquitto, Kafka and RabbitMQ
Message Queuing - Gearman, Mosquitto, Kafka and RabbitMQ
 
How to successfully migrate to DevOps .pdf
How to successfully migrate to DevOps .pdfHow to successfully migrate to DevOps .pdf
How to successfully migrate to DevOps .pdf
 
How to survive in the work from home era
How to survive in the work from home eraHow to survive in the work from home era
How to survive in the work from home era
 
Managing sysadmins
Managing sysadminsManaging sysadmins
Managing sysadmins
 
Improve your storage with bcachefs
Improve your storage with bcachefsImprove your storage with bcachefs
Improve your storage with bcachefs
 
Control your service resources with systemd
 Control your service resources with systemd  Control your service resources with systemd
Control your service resources with systemd
 
Comparison of-foss-distributed-storage
Comparison of-foss-distributed-storageComparison of-foss-distributed-storage
Comparison of-foss-distributed-storage
 
Защо и как да обогатяваме знанията си?
Защо и как да обогатяваме знанията си?Защо и как да обогатяваме знанията си?
Защо и как да обогатяваме знанията си?
 
Securing your MySQL server
Securing your MySQL serverSecuring your MySQL server
Securing your MySQL server
 
Sysadmin vs. dev ops
Sysadmin vs. dev opsSysadmin vs. dev ops
Sysadmin vs. dev ops
 
DoS and DDoS mitigations with eBPF, XDP and DPDK
DoS and DDoS mitigations with eBPF, XDP and DPDKDoS and DDoS mitigations with eBPF, XDP and DPDK
DoS and DDoS mitigations with eBPF, XDP and DPDK
 
Challenges with high density networks
Challenges with high density networksChallenges with high density networks
Challenges with high density networks
 
SiteGround building automation
SiteGround building automationSiteGround building automation
SiteGround building automation
 
Preventing cpu side channel attacks with kernel tracking
Preventing cpu side channel attacks with kernel trackingPreventing cpu side channel attacks with kernel tracking
Preventing cpu side channel attacks with kernel tracking
 
Managing a lot of servers
Managing a lot of serversManaging a lot of servers
Managing a lot of servers
 
Let's Encrypt failures
Let's Encrypt failuresLet's Encrypt failures
Let's Encrypt failures
 

Recently uploaded

result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Tonystark477637
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 

Protecting your data when entering the US

  • 2. Who am I? ● Chief System Architect of ● I teach Network Security and Linux System Administration
  • 3. ● Slashdot 08.Feb.2017 US Visitors May Have to Hand Over Social Media Passwords: DHS ● Slashdot 12.Feb.2017 US-Born NASA Scientist Detained At The Border Until He Unlocked His Phone
  • 4. ● Slashdot 18.May.2017 US and EU Reject Expanding Laptop Ban To Flights From Europe
  • 5. ● Slashdot 18.May.2017 US and EU Reject Expanding Laptop Ban To Flights From Europe ● What does this actually mean?
  • 6. ● Now a simple trip to the US becomes threat to your personal life and company data ● You do not have rights under the US law, because technically you haven't entered the US ● The DHS agents may decide to copy all your data, without notifying you.
  • 7. ● By giving away your passwords to the DHS you may violate the contract with your company and immediately become liable under the laws of your own country ● EU privacy laws state that customer data, such as names, addresses, IDs and so on, should be stored only on EU soil. If for whatever strange reason you had left any such data on machine that is searched by the DHS, you and your company are liable under EU privacy laws – EU GDPR
  • 8. ● Why would you unlock your laptop/phone – you may be detained until you provide your passwords – you will miss all your appointments – you will lose the money for this whole trip – you will lose potential customers – miss conference or training
  • 9. ● So what can YOU do? – encrypt the data on your computer ● cripple on purpose your encrypted storage ● leave the beginning of your encrypted storage at home or at any other third party, that you can relay on ● make sure there is NO WAY for YOU to recover the encrypted data, without that part, that is NOT with you
  • 10. ● Why would you leave most of your data on the laptop and only cripple the encrypted storage? – Internet in the US is actually BAD... VERY BAD – Downloading 10-15GB of data may not even finish for one night :( – leaving most of your data on your PC means faster restore time
  • 11. ● What to encrypt – all private data – browser profile – emails and email profiles – all downloads – all instant messaging logs – settings of your applications
  • 12. ● If you have a VPN, keep its keys in the encrypted storage, so DHS would not have access to them ● It is also a good idea to disable your VPN keys/accounts while you are traveling to/from the US. – setup a simple and effective way to enable your VPN once you have passed the border control
  • 13. ● Keep all your passwords and keys encrypted – make sure you can not retrieve them without a third person that is NOT in the US right now – this way you will NOT lie to a polygraph test and you may hope for faster entry in the US
  • 14. Phone ● Wipe your phone before boarding the flight to the US ● Remove all facebook/google/slack/twitter and etc. accounts ● Move all your private data to encrypted SD card and remove it from your phone before boarding the flight – I'm sorry iPhone users... for you, you can backup everything to the iCloud ● Once you are at the hotel, recover your phone from your PC
  • 15. What am I doing ● eCryptfs ● LUKS over a loop device ● Keep all passwords, including the one for the eCryptfs on the LUKS ● Cripple the LUKS ● My wife has the important 5MB from the image and she will tell me where she uploaded them once I enter the US