Snail mail the device

Don’t want to have your device seized when you cross the border? Why not just stick it in the mail? True: there are no privacy protections afforded to data sent by post. But you can avoid awkward confrontations with border agents if you mailed it and you won’t be questioned about your devices or prodded for passphrases to decrypt them.


Don’t want to have your device seized when you cross the border? Why not just stick it in the mail? True: there are no privacy protections afforded to data sent by post. But you can avoid awkward confrontations with border agents if you mailed it and you won’t be questioned about your devices or prodded for passphrases to decrypt them.


Suggested articles

2020 Cybersecurity Trends to Watch

Mobile becomes a prime phishing attack vector, hackers will increasingly employ machine learning in attacks and cloud will increasingly be seen as fertile ground for compromise.

Top Mobile Security Stories of 2019

Cybercrime increasingly went mobile in 2019, with everything from Apple iPhone jailbreaks and rogue Android apps to 5G and mobile-first phishing dominating the news coverage. Here are Threatpost’s Top 10 mobile security stories of 2019.