Privacy and digital supporters prefer to approach to build a travel device from the beginning, but they warn that a phone is too clean, too like a burner phone, can arouse suspicion.
“You have to 'sow' the device. Use your phone for a day or even for a few hours. It can't be possible clean Clean. It was strange, Mr. Matt Mitchell, the founder of Cryptoharlem, a non -profit organization and security training and protection. Many people have a few accounts. A ratchet, a healthy person, another person on a trip.
Cyr, from an international amnesty organization, also shows that a real phone will really be a stupid phone, without being able to run applications to contact encrypted. The advantage that we all have with a smartphone is that you can follow the encrypted way, according to Mr. CYR. People should be aware that any unkinding communication is less secure than a phone call or a message on an application as a signal.
Although a travel device does not need to use a prepaid SIM card purchased in cash, it should not share your normal phone number, because this number can be linked to most if not all your main digital accounts. Buy a SIM card for your trip or only use the device on Wi-Fi.
Traveling with your main phone
The other approach that you can do to protect your device during the border intersection is to modify your main smartphone before moving. This involves deleting old photos and messages and storing them elsewhere, cleaning unnecessary applications and deleting some complete applications or logging in them with your main accounts and logging back in with travel accounts.
Mohammed Al-Maskati, Director of Digital Security Help at the access group right now, says people should consider this type of clean before they travel. I will look at my device and see the applications I need, he said. “If I don't need the application, I just need to delete it.”
Al-Maskati added that he suggested that people especially remember to eliminate dating applications and anything related to the LGBTQI community, especially if they think they are at risk of finding higher equipment. And in general, this approach is only safe if you are especially diligent in eliminating all applications that can make you risk.
You can use your own phone as a travel phone by backing up it, wiping it, building a travel device with only the applications you really need when traveling, traveling on the trip and then restoring from the backup when you go home. This approach can be done but it is time -consuming and it creates more opportunities for operating security mistakes or what is called the failure of Opsec. If you try to delete all your old, unwanted applications, but miss a application, you can eventually expose an old social media account or other historical service that has forgotten the data in it. Message applications may have easy -to -find storage documents easily to return and can Automatically save photos and files But you don't recognize it. And if you back up your data to the cloud and remove your device, but still be logged into a cloud account as the foundation for other services (such as your own Google or Apple account), you may be required to create data from the cloud to check.