SlideShare une entreprise Scribd logo
1  sur  16
The Trump Era
Who am I?
● Chief System Architect of
● I teach Network Security and Linux System
Administration
● Slashdot 08.Feb.2017
US Visitors May Have to Hand
Over Social Media
Passwords: DHS
● Slashdot 12.Feb.2017
US-Born NASA Scientist
Detained At The Border Until
He Unlocked His Phone
● Slashdot 18.May.2017
US and EU Reject Expanding
Laptop Ban To Flights From
Europe
● Slashdot 18.May.2017
US and EU Reject Expanding
Laptop Ban To Flights From
Europe
● What does this actually
mean?
● Now a simple trip to the US becomes threat to
your personal life and company data
● You do not have rights under the US law,
because technically you haven't entered the US
● The DHS agents may decide to copy all your
data, without notifying you.
● By giving away your passwords to the DHS you
may violate the contract with your company and
immediately become liable under the laws of
your own country
● EU privacy laws state that customer data, such
as names, addresses, IDs and so on, should be
stored only on EU soil. If for whatever strange
reason you had left any such data on machine
that is searched by the DHS, you and your
company are liable under EU privacy laws
– EU GDPR
● Why would you unlock your laptop/phone
– you may be detained until you provide your
passwords
– you will miss all your appointments
– you will lose the money for this whole trip
– you will lose potential customers
– miss conference or training
● So what can YOU do?
– encrypt the data on your computer
● cripple on purpose your encrypted storage
● leave the beginning of your encrypted
storage at home or at any other third party,
that you can relay on
● make sure there is NO WAY for YOU to
recover the encrypted data, without that
part, that is NOT with you
● Why would you leave most of your data on the
laptop and only cripple the encrypted storage?
– Internet in the US is actually BAD... VERY BAD
– Downloading 10-15GB of data may not even finish
for one night :(
– leaving most of your data on your PC means faster
restore time
● What to encrypt
– all private data
– browser profile
– emails and email profiles
– all downloads
– all instant messaging logs
– settings of your applications
● If you have a VPN, keep its keys in the
encrypted storage, so DHS would not have
access to them
● It is also a good idea to disable your VPN
keys/accounts while you are traveling to/from
the US.
– setup a simple and effective way to enable your
VPN once you have passed the border control
● Keep all your passwords and keys encrypted
– make sure you can not retrieve them without a third
person that is NOT in the US right now
– this way you will NOT lie to a polygraph test and
you may hope for faster entry in the US
Phone
● Wipe your phone before boarding the flight to
the US
● Remove all facebook/google/slack/twitter and
etc. accounts
● Move all your private data to encrypted SD card
and remove it from your phone before boarding
the flight
– I'm sorry iPhone users... for you, you can backup
everything to the iCloud
● Once you are at the hotel, recover your phone
from your PC
What am I doing
● eCryptfs
● LUKS over a loop device
● Keep all passwords, including the one for the
eCryptfs on the LUKS
● Cripple the LUKS
● My wife has the important 5MB from the image
and she will tell me where she uploaded them
once I enter the US
Thank you!

Contenu connexe

En vedette

En vedette (14)

Home assistant
Home assistantHome assistant
Home assistant
 
LUG-BG - Kostadin Slavkov - PostgreSQL 10
LUG-BG - Kostadin Slavkov - PostgreSQL 10LUG-BG - Kostadin Slavkov - PostgreSQL 10
LUG-BG - Kostadin Slavkov - PostgreSQL 10
 
Make your internship "worth it"
Make your internship "worth it"Make your internship "worth it"
Make your internship "worth it"
 
How to setup your linux server
How to setup your linux serverHow to setup your linux server
How to setup your linux server
 
Lxd the proper way of runing containers
Lxd   the proper way of runing containersLxd   the proper way of runing containers
Lxd the proper way of runing containers
 
Introduction to python
Introduction to pythonIntroduction to python
Introduction to python
 
Practical my sql performance optimization
Practical my sql performance optimizationPractical my sql performance optimization
Practical my sql performance optimization
 
Why we are migrating to Slackware
Why we are migrating to SlackwareWhy we are migrating to Slackware
Why we are migrating to Slackware
 
Moving your router inside container
Moving your router inside container Moving your router inside container
Moving your router inside container
 
LUG-BG 2017 - Rangel Ivanov - Spread some butter - BTRFS
LUG-BG 2017 - Rangel Ivanov - Spread some butter - BTRFSLUG-BG 2017 - Rangel Ivanov - Spread some butter - BTRFS
LUG-BG 2017 - Rangel Ivanov - Spread some butter - BTRFS
 
Computer vision for your projects
Computer vision for your projectsComputer vision for your projects
Computer vision for your projects
 
Securing the network for VMs or Containers
Securing the network for VMs or ContainersSecuring the network for VMs or Containers
Securing the network for VMs or Containers
 
Performance comparison of Distributed File Systems on 1Gbit networks
Performance comparison of Distributed File Systems on 1Gbit networksPerformance comparison of Distributed File Systems on 1Gbit networks
Performance comparison of Distributed File Systems on 1Gbit networks
 
nftables - the evolution of Linux Firewall
nftables - the evolution of Linux Firewallnftables - the evolution of Linux Firewall
nftables - the evolution of Linux Firewall
 

Similaire à Protecting your data when entering the US

Your cell phone is covered in spiders
Your cell phone is covered in spidersYour cell phone is covered in spiders
Your cell phone is covered in spiders
cooperq
 
Freezing Android Bypass
Freezing Android BypassFreezing Android Bypass
Freezing Android Bypass
Matthew Kwong
 
How you can become a hacker with no security experience
How you can become a hacker with no security experienceHow you can become a hacker with no security experience
How you can become a hacker with no security experience
Avădănei Andrei
 

Similaire à Protecting your data when entering the US (20)

Securing your digital life - Jason Addie
Securing your digital life -  Jason AddieSecuring your digital life -  Jason Addie
Securing your digital life - Jason Addie
 
Computer Security For Activists & Everyone (Oct 2018)
Computer Security For Activists & Everyone (Oct 2018)Computer Security For Activists & Everyone (Oct 2018)
Computer Security For Activists & Everyone (Oct 2018)
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Don't Diligence Information Security for Lawyers
Don't Diligence Information Security for LawyersDon't Diligence Information Security for Lawyers
Don't Diligence Information Security for Lawyers
 
Hit by a Cyberattack: lesson learned
 Hit by a Cyberattack: lesson learned Hit by a Cyberattack: lesson learned
Hit by a Cyberattack: lesson learned
 
Secure Communication
Secure CommunicationSecure Communication
Secure Communication
 
Your cell phone is covered in spiders
Your cell phone is covered in spidersYour cell phone is covered in spiders
Your cell phone is covered in spiders
 
Mc physics colloquium2018-03-30.-handouts
Mc physics colloquium2018-03-30.-handoutsMc physics colloquium2018-03-30.-handouts
Mc physics colloquium2018-03-30.-handouts
 
Securitytips
SecuritytipsSecuritytips
Securitytips
 
Simple Computer Tips - Screen Shots, Passwords, etc
Simple Computer Tips - Screen Shots, Passwords, etcSimple Computer Tips - Screen Shots, Passwords, etc
Simple Computer Tips - Screen Shots, Passwords, etc
 
Freezing Android Bypass
Freezing Android BypassFreezing Android Bypass
Freezing Android Bypass
 
DSRY_Cybersecurity Awareness Presentation
DSRY_Cybersecurity Awareness PresentationDSRY_Cybersecurity Awareness Presentation
DSRY_Cybersecurity Awareness Presentation
 
Seizing Electronic Evidence & Best Practices – Secret Service
Seizing Electronic Evidence & Best Practices – Secret ServiceSeizing Electronic Evidence & Best Practices – Secret Service
Seizing Electronic Evidence & Best Practices – Secret Service
 
How you can become a hacker with no security experience
How you can become a hacker with no security experienceHow you can become a hacker with no security experience
How you can become a hacker with no security experience
 
Online Privacy & Computer Security Basics (September 2017)
Online Privacy & Computer Security Basics (September 2017)Online Privacy & Computer Security Basics (September 2017)
Online Privacy & Computer Security Basics (September 2017)
 
Digital Security Tips for Hong Kongers
Digital Security Tips for Hong KongersDigital Security Tips for Hong Kongers
Digital Security Tips for Hong Kongers
 
Keeping 'Em Safe: Ways to Protect Your Clients Online
Keeping 'Em Safe: Ways to Protect Your Clients OnlineKeeping 'Em Safe: Ways to Protect Your Clients Online
Keeping 'Em Safe: Ways to Protect Your Clients Online
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
 
Everyday computer tips
Everyday computer tipsEveryday computer tips
Everyday computer tips
 

Plus de Marian Marinov

Plus de Marian Marinov (20)

Dev.bg DevOps March 2024 Monitoring & Logging
Dev.bg DevOps March 2024 Monitoring & LoggingDev.bg DevOps March 2024 Monitoring & Logging
Dev.bg DevOps March 2024 Monitoring & Logging
 
Basic presentation of cryptography mechanisms
Basic presentation of cryptography mechanismsBasic presentation of cryptography mechanisms
Basic presentation of cryptography mechanisms
 
Microservices: Benefits, drawbacks and are they for me?
Microservices: Benefits, drawbacks and are they for me?Microservices: Benefits, drawbacks and are they for me?
Microservices: Benefits, drawbacks and are they for me?
 
Introduction and replication to DragonflyDB
Introduction and replication to DragonflyDBIntroduction and replication to DragonflyDB
Introduction and replication to DragonflyDB
 
Message Queuing - Gearman, Mosquitto, Kafka and RabbitMQ
Message Queuing - Gearman, Mosquitto, Kafka and RabbitMQMessage Queuing - Gearman, Mosquitto, Kafka and RabbitMQ
Message Queuing - Gearman, Mosquitto, Kafka and RabbitMQ
 
How to successfully migrate to DevOps .pdf
How to successfully migrate to DevOps .pdfHow to successfully migrate to DevOps .pdf
How to successfully migrate to DevOps .pdf
 
How to survive in the work from home era
How to survive in the work from home eraHow to survive in the work from home era
How to survive in the work from home era
 
Managing sysadmins
Managing sysadminsManaging sysadmins
Managing sysadmins
 
Improve your storage with bcachefs
Improve your storage with bcachefsImprove your storage with bcachefs
Improve your storage with bcachefs
 
Control your service resources with systemd
 Control your service resources with systemd  Control your service resources with systemd
Control your service resources with systemd
 
Comparison of-foss-distributed-storage
Comparison of-foss-distributed-storageComparison of-foss-distributed-storage
Comparison of-foss-distributed-storage
 
Защо и как да обогатяваме знанията си?
Защо и как да обогатяваме знанията си?Защо и как да обогатяваме знанията си?
Защо и как да обогатяваме знанията си?
 
Securing your MySQL server
Securing your MySQL serverSecuring your MySQL server
Securing your MySQL server
 
Sysadmin vs. dev ops
Sysadmin vs. dev opsSysadmin vs. dev ops
Sysadmin vs. dev ops
 
DoS and DDoS mitigations with eBPF, XDP and DPDK
DoS and DDoS mitigations with eBPF, XDP and DPDKDoS and DDoS mitigations with eBPF, XDP and DPDK
DoS and DDoS mitigations with eBPF, XDP and DPDK
 
Challenges with high density networks
Challenges with high density networksChallenges with high density networks
Challenges with high density networks
 
SiteGround building automation
SiteGround building automationSiteGround building automation
SiteGround building automation
 
Preventing cpu side channel attacks with kernel tracking
Preventing cpu side channel attacks with kernel trackingPreventing cpu side channel attacks with kernel tracking
Preventing cpu side channel attacks with kernel tracking
 
Managing a lot of servers
Managing a lot of serversManaging a lot of servers
Managing a lot of servers
 
Let's Encrypt failures
Let's Encrypt failuresLet's Encrypt failures
Let's Encrypt failures
 

Dernier

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 

Dernier (20)

(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 

Protecting your data when entering the US

  • 2. Who am I? ● Chief System Architect of ● I teach Network Security and Linux System Administration
  • 3. ● Slashdot 08.Feb.2017 US Visitors May Have to Hand Over Social Media Passwords: DHS ● Slashdot 12.Feb.2017 US-Born NASA Scientist Detained At The Border Until He Unlocked His Phone
  • 4. ● Slashdot 18.May.2017 US and EU Reject Expanding Laptop Ban To Flights From Europe
  • 5. ● Slashdot 18.May.2017 US and EU Reject Expanding Laptop Ban To Flights From Europe ● What does this actually mean?
  • 6. ● Now a simple trip to the US becomes threat to your personal life and company data ● You do not have rights under the US law, because technically you haven't entered the US ● The DHS agents may decide to copy all your data, without notifying you.
  • 7. ● By giving away your passwords to the DHS you may violate the contract with your company and immediately become liable under the laws of your own country ● EU privacy laws state that customer data, such as names, addresses, IDs and so on, should be stored only on EU soil. If for whatever strange reason you had left any such data on machine that is searched by the DHS, you and your company are liable under EU privacy laws – EU GDPR
  • 8. ● Why would you unlock your laptop/phone – you may be detained until you provide your passwords – you will miss all your appointments – you will lose the money for this whole trip – you will lose potential customers – miss conference or training
  • 9. ● So what can YOU do? – encrypt the data on your computer ● cripple on purpose your encrypted storage ● leave the beginning of your encrypted storage at home or at any other third party, that you can relay on ● make sure there is NO WAY for YOU to recover the encrypted data, without that part, that is NOT with you
  • 10. ● Why would you leave most of your data on the laptop and only cripple the encrypted storage? – Internet in the US is actually BAD... VERY BAD – Downloading 10-15GB of data may not even finish for one night :( – leaving most of your data on your PC means faster restore time
  • 11. ● What to encrypt – all private data – browser profile – emails and email profiles – all downloads – all instant messaging logs – settings of your applications
  • 12. ● If you have a VPN, keep its keys in the encrypted storage, so DHS would not have access to them ● It is also a good idea to disable your VPN keys/accounts while you are traveling to/from the US. – setup a simple and effective way to enable your VPN once you have passed the border control
  • 13. ● Keep all your passwords and keys encrypted – make sure you can not retrieve them without a third person that is NOT in the US right now – this way you will NOT lie to a polygraph test and you may hope for faster entry in the US
  • 14. Phone ● Wipe your phone before boarding the flight to the US ● Remove all facebook/google/slack/twitter and etc. accounts ● Move all your private data to encrypted SD card and remove it from your phone before boarding the flight – I'm sorry iPhone users... for you, you can backup everything to the iCloud ● Once you are at the hotel, recover your phone from your PC
  • 15. What am I doing ● eCryptfs ● LUKS over a loop device ● Keep all passwords, including the one for the eCryptfs on the LUKS ● Cripple the LUKS ● My wife has the important 5MB from the image and she will tell me where she uploaded them once I enter the US