Hi all,

I am travelling soon to the US, for my vocation and as a long-time private person I will be taking some steps to maintain my privacy as I enter the country.

As this is an interesting area of the topic, I have decided to throw the question open to all of you.

What precautions (IT, physical, mental, otherwise) do you undertake when travelling internationally?

M.

  • wildbus8979@sh.itjust.works
    link
    fedilink
    arrow-up
    56
    arrow-down
    1
    ·
    8 months ago

    You absolutely can opt out of facial recognition at the TSA! But you have to be on your guards and make sure you request it! They might fake not knowing so you should insist!

    • OSH@lemmy.ml
      link
      fedilink
      arrow-up
      30
      ·
      8 months ago

      If I just would have known it earlier.

      It was quite the surprise when boarding the return flight without having to show any baoarding passes.

    • auth@lemmy.ml
      link
      fedilink
      arrow-up
      13
      arrow-down
      1
      ·
      8 months ago

      if that’s true, you are probably opting out of them telling you they are using facial recognition… but they probably still use it… how else would they know how to exclude you?

      • wildbus8979@sh.itjust.works
        link
        fedilink
        arrow-up
        6
        ·
        8 months ago

        I believe they use a special camera for this, if you opt out you don’t go in front of it. But s, yes, surely there’s a ton of other facial recognition in airports using security cameras and stuff. Total Domain Awareness is everywhere. But every bit counts.

    • DirigibleProtein
      link
      fedilink
      arrow-up
      9
      ·
      8 months ago

      I wore a proper N95 mask the whole time. Told people I have cancer and am immune compromised so I can’t take it off (ok that bit’s true). Never had any problem avoiding facial recognition; but it’s possible that their particular facial recognition works around masks.

  • Gbagginsthe3rd
    link
    fedilink
    arrow-up
    42
    arrow-down
    2
    ·
    8 months ago

    Guessing you’ll take a burner phone? On arrival and Dep in Aus they can demand you open it and they can search anything. If you refuse they quarantine your phone for 14 days and prob use some Israeli software to access the contents

  • helpImTrappedOnline@lemmy.world
    link
    fedilink
    arrow-up
    35
    arrow-down
    2
    ·
    edit-2
    8 months ago

    You know those movies were the main character blinks and their stuff gets stolen? That’s pretty much true in some of the cities.

    Also if someone is asking you for gas money, help at the atm, trying to sell you something random - leave.

    lemmy.one/c/scams seems to have a lot of the common ones listed. It might be worth lurking on r/scams to see if there’s anything more current to watch out for.

  • Dr. Wesker@lemmy.sdf.org
    link
    fedilink
    English
    arrow-up
    29
    ·
    edit-2
    8 months ago

    Encrypted personal devices, and VPNs, mostly. It’s really difficult to maintain real privacy when travelling through customs, the best I can do is make sure my persisted data is safe, and my internet traffic is obfuscated.

    EDIT: I keep an encrypted USB pen drive with emergency information on it, should something happen to my phone or laptop, I can quickly get back off the ground.

    • LlilL@lemm.ee
      link
      fedilink
      arrow-up
      1
      ·
      8 months ago

      How do you have that pen drive setup? What are you using to encrypt that drive? If it’s a third party encryptor, do you have the encrypt or install file downloaded on that drive also? Basically, what’s the process to get back up and running again?

      • Dr. Wesker@lemmy.sdf.org
        link
        fedilink
        English
        arrow-up
        2
        ·
        8 months ago

        I use VeraCrypt to encrypt the whole partition, with a password. I then have on the encrypted partition a backup of my phone contacts, as well as a restricted access wireguard config file pointed at my server. That server hosts VaultWarden, where I can log in with an additional password, and download a wireguard config file with higher access. I then connect using said higher access VPN profile and can download phone backups, access a VaultWarden account with my actual logins, etc.

  • Hellfire103@lemmy.ca
    link
    fedilink
    English
    arrow-up
    29
    arrow-down
    1
    ·
    8 months ago

    Either bring a burner phone, or make sure you disable biometrics before you land. You could also consider wiping the phone and then restoring from a backup later on.

    Also, learn about your constitutional rights and any relevant state laws (e.g. the CCPA in California). You probably won’t have to mention them, but they’re good to know.

    • Snot Flickerman@lemmy.blahaj.zone
      link
      fedilink
      English
      arrow-up
      2
      ·
      8 months ago

      Do not even bring your own electronics (phone, laptop) as it can be destroyed, stolen or lost by customs, TSA, and the airlines respectively.

  • auth@lemmy.ml
    link
    fedilink
    arrow-up
    22
    arrow-down
    1
    ·
    edit-2
    8 months ago

    buy a burner phone when you get there and leave your phone at home… also use cash and not credit cards… it would help to know exactly where you are going to be able to give more tips…

      • auth@lemmy.ml
        link
        fedilink
        arrow-up
        12
        arrow-down
        1
        ·
        edit-2
        8 months ago

        exactly. each states, cities or even neighborhoods can be completely different…

        Downtown Atlanta, moving just a few blocks can put you in a hell hole. Some stores need to have multiple cops guarding them at all times, for example.

  • kandoh@reddthat.com
    link
    fedilink
    arrow-up
    21
    arrow-down
    2
    ·
    edit-2
    8 months ago

    Anything email or text related on your phone should be printed off. If you hand the border agent your phone they will take that opportunity to read your recent texts and emails.

    • sugar_in_your_tea@sh.itjust.works
      link
      fedilink
      arrow-up
      12
      ·
      edit-2
      8 months ago

      I’ve never seen this, but I still get physical boarding passes every time. At most airports, you just scan your phone and the agent waves you on. However, if you hand a police officer of any variety your phone, they can attempt to access whatever they want w/o a warrant, which sucks, so it’s not really a risk worth taking when you can usually print a boarding pass at a kiosk.

      • kandoh@reddthat.com
        link
        fedilink
        arrow-up
        5
        ·
        8 months ago

        It happens frequently if you’re bussing into the US. Using a poor person’s method of travel makes them very suspicious

  • ExtremeDullard@lemmy.sdf.org
    link
    fedilink
    arrow-up
    29
    arrow-down
    10
    ·
    edit-2
    8 months ago

    Imagine you’re visiting a dystopian police state with ubiquitous surveillance and a non-zero chance to be thrown in jail without due process, because you are.

    • Tyfud@lemmy.world
      link
      fedilink
      arrow-up
      11
      ·
      8 months ago

      When dealing with the police, be very, very careful what you say to them directly. Be polite, be patient, but be pithy.

      • communism@lemmy.ml
        link
        fedilink
        arrow-up
        1
        ·
        8 months ago

        Doesn’t the US have the right to remain silent? Serious question—I thought it did. The advice here is to always stfu when cops try to speak to you, until you either get advice from a lawyer or very specific questions you can answer to expedite your release. If you have the right to remain silent I’d always suggest you exercise that right, and not even make “polite” small talk, just say nothing or “no comment”.

  • electricprism@lemmy.ml
    link
    fedilink
    arrow-up
    23
    arrow-down
    5
    ·
    edit-2
    8 months ago

    Soooo the data on your phone isn’t gone because you delete or reset the phone. You literally need to write a blob of zeros or random numbers to fill the space again.

    And even that is questionable as there are areas of the storage you are not allowed to write too – and those areas could contain identifiable data like contacts, SMS, etc…

    Just a FYI

    • whereisk@lemmy.world
      link
      fedilink
      arrow-up
      5
      ·
      8 months ago

      Not quite true for phones or anything with SSDs with trim enabled - in most scenarios the data is unrecoverable except for tiny fragments or if you go through some huge effort of pulling the flash chips out and also are lucky, true enough for memory cards or spinning disks though.

      • wildbus8979@sh.itjust.works
        link
        fedilink
        arrow-up
        4
        ·
        8 months ago

        On Android for example, trim only runs every 24h, if the battery is above a certain charge level, and maybe some.other conditions. So it’s not entirely bulletproof either. Recent things can be recovered.

        • whereisk@lemmy.world
          link
          fedilink
          arrow-up
          3
          ·
          8 months ago

          Definitely not bulletproof - but unless they’re after you specifically, and this is the only avenue remaining, the cost of attempting recovery and the risk of alerting you that they are in fact after you, when in the vast majority of circumstances it would yield very little, one would think there’d be cheaper ways to get your data directly from cloud providers or through other, more traditional methods.

          Then again I could be naive about this.

    • Atemu@lemmy.ml
      link
      fedilink
      arrow-up
      1
      ·
      8 months ago

      This is not true. As soon as the key is wiped from the TPM-like thingy, any data left on the flash is unrecoverable.

  • The 8232 Project@lemmy.ml
    link
    fedilink
    arrow-up
    18
    arrow-down
    1
    ·
    8 months ago

    Here are some helpful links from the EFF (Electronic Frontier Foundation) on the topic:

    https://www.eff.org/wp/defending-privacy-us-border-guide-travelers-carrying-digital-devices

    https://www.eff.org/files/2017/03/10/digital-privacy-border-2017-guide3.10.17.pdf

    https://www.eff.org/files/2018/01/11/border-pocket-guide-2.pdf

    https://www.eff.org/issues/border-searches

    I’m sure there’s more that I haven’t put here, feel free to sift through the search page

    Having lived in the U.S. my whole life, (and this doesn’t speak for everyone), it’s not the dystopia people make it out to be all the time. In fact, people will likely judge you for wearing a face mask. If you care about hiding your face, sunglasses and a cap is enough. Remember to be reasonable with your threat model!

  • hperrin@lemmy.world
    link
    fedilink
    arrow-up
    16
    arrow-down
    1
    ·
    8 months ago

    Bring your own router. Don’t plug things directly into the ethernet jacks in hotel rooms. Plug your router into there and connect to it instead. If you can then VPN into your home network, even better.

    • u/lukmly013 💾 (lemmy.sdf.org)@lemmy.sdf.org
      link
      fedilink
      English
      arrow-up
      7
      ·
      8 months ago

      DD-WRT is fairly easy to set up and has VPN support. I recommend using Wireguard as opposed to OpenVPN due to efficiency, ESPECIALLY WITH CHEAP WEAK ROUTERS.
      I mean, it’s a huge difference from my tests. With OpenVPN I hit 100% CPU usage on my Cisco Linksys WRT160NL at just 5Mbps. With Wireguard I was doing 25Mbps with just around 20% CPU usage (reported by top, not webUI).

  • csm10495@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    13
    arrow-down
    1
    ·
    edit-2
    8 months ago

    A lot of the comments here are straight up nuts. Do what you do at home. If that’s a VPN, go for it. If you rawdog it, whatevs.

    Https is on almost everything at this point, so just be smart like normal.

    I doubt anyone cares enough to bug you that much.

    • Zahille7@lemmy.world
      link
      fedilink
      arrow-up
      5
      arrow-down
      1
      ·
      edit-2
      8 months ago

      You weren’t kidding, holy shit. Like, I understand wanting to make sure that your privacy is protected at all costs, but at the same time some of these suggestions sound straight up tinfoil hat.

      The US is not some fucked up dystopian police state where everyone is “out to get” the next person they see on the street (but I’ll wholeheartedly agree that some parts are absolute shit). No, there aren’t cities where if you blink all your shit’s gonna be stolen (parts of some, sure). In fact, most people will actually actively try to lend a hand, the worst that might happen is a total stranger ignores you when it’s obvious you may need help with something.

      Idk, as an American who’s travelled the US quite a bit, I guess it kinda pisses me off when I see generalizing statements like those. Just like it would literally anyone else.

      Edit: if you’re truly worried, why not just stay home or something?

    • kylian0087@lemmy.world
      link
      fedilink
      arrow-up
      2
      ·
      8 months ago

      What you can do is setup a VPN to your home at least. From their it is the same as you always would.

  • Krafty Kactus@sopuli.xyz
    link
    fedilink
    English
    arrow-up
    10
    arrow-down
    2
    ·
    8 months ago

    If you can, a GrapheneOS phone would be a good investment. It allows for multiple profiles so you can switch to your travel one and just call it [your name], have a few dummy ones, and have your actual main profile be something inconspicuous like “kids’ profile” or just any name that they wouldn’t deem necessary to search (what border patrol would actually dig around that much in your phone).