this post was submitted on 25 Mar 2026
15 points (100.0% liked)

Progressive Politics

4398 readers
817 users here now

Welcome to Progressive Politics! A place for news updates and political discussion from a left perspective. Conservatives and centrists are welcome just try and keep it civil :)

(Sidebar still a work in progress post recommendations if you have them such as reading lists)

founded 2 years ago
MODERATORS
 

The only surefire way to keep your devices from being searched and seized is to simply not bring them with you on your trip. If you can’t leave them at home, consider mailing them to and from your destination.

Another option is to leave devices that contain sensitive information at home and instead bring throwaway travel devices you’re willing to have searched or confiscated. This doesn’t need to be an expensive proposition. You can reformat and repurpose an old phone or tablet, or purchase refurbished older models that are comparatively cheap. Then buy a temporary SIM card or eSIM so that you’re not using your usual number. Remember to let contacts know that for the duration of your trip you’ll be reachable at a different number.

Create a travel account for these devices. You can do so by starting a fresh account in the App Store or Google Play. This should ensure that if you’re forced to log into your device by authorities at the airport, the only information they’ll find is data you’ve put on this specific piece of hardware. CBP agents are supposed to only be able to look at data that’s local on the phone.

you are viewing a single comment's thread
view the rest of the comments
[–] BonkTheAnnoyed@lemmy.blahaj.zone 4 points 5 hours ago (1 children)

I sync important things to an encrypted drive, so I can flash and restore with little lost but convenience and a couple of hours of downtime.

[–] Dionysus@leminal.space 1 points 4 hours ago* (last edited 4 hours ago) (1 children)

They kept a ~~titan key~~ Iron Key of mine when I said I couldn't remember the passcode. Never got it back. 2018, ymmv.

[–] BonkTheAnnoyed@lemmy.blahaj.zone 1 points 3 hours ago (1 children)

Iron Key

Exactly! But it's easy to flash to something that boots and looks plausible, then sync back all your stuff when you get to your destination

[–] Dionysus@leminal.space 1 points 3 hours ago

Truecrypt used to do this, hidden drives inside of encrypted drives, impossible to tell if you are looking at the hidden or encrypted.

Wish more phones came like this, even GraphineOS isn't that good at data silos