Snail mail the data

Another way to avoid having your digital privacy intruded upon is to backup all the data onto an external hard drive, USB drive or SD card (making sure the content of your backup is encrypted, of course). You can then ship the data to your destination. With your data copied off the device, you can wipe the machine you just backed up, and travel across the border with a completely blank device or one with the default configuration. Once reunited with the external hard drive you can restore the data to whichever machine you ended up traveling with.

Another way to avoid having your digital privacy intruded upon is to backup all the data onto an external hard drive, USB drive or SD card (making sure the content of your backup is encrypted, of course). You can then ship the data to your destination. With your data copied off the device, you can wipe the machine you just backed up, and travel across the border with a completely blank device or one with the default configuration. Once reunited with the external hard drive you can restore the data to whichever machine you ended up traveling with.

(Image via command-tab‘s Flickr photostream)

Suggested articles

2020 Cybersecurity Trends to Watch

Mobile becomes a prime phishing attack vector, hackers will increasingly employ machine learning in attacks and cloud will increasingly be seen as fertile ground for compromise.

Top Mobile Security Stories of 2019

Cybercrime increasingly went mobile in 2019, with everything from Apple iPhone jailbreaks and rogue Android apps to 5G and mobile-first phishing dominating the news coverage. Here are Threatpost’s Top 10 mobile security stories of 2019.

Discussion

Subscribe to our newsletter, Threatpost Today!

Get the latest breaking news delivered daily to your inbox.