Crossing the Border With Your Electronic Devices
Offered By: 0xdade via YouTube
Course Description
Overview
Explore the critical issues surrounding digital privacy and security at national borders in this 49-minute conference talk from Shmoocon 2020. Delve into the legal and policy challenges of border searches, and discover technological measures to protect personal data while traveling. Learn about the implications of digital device searches for security researchers and the general public, covering topics such as the border search exception, recent legal developments, and practical tips for safeguarding sensitive information. Gain insights from Electronic Frontier Foundation experts Bill Budington and Kurt Opsahl on balancing privacy rights with border security concerns, and understand the importance of protecting digital rights in an increasingly connected world.
Syllabus
Intro
Why is Security and Privacy Important for Digital Devices?
It's a Window into Your Soul
Digital Devices Can Hold Privileged Information
There's a Bad Moon on the Rise
Bureaucracy of Border Search
Extreme Vetting
US: Border Search Exception
Supreme Court Steps Up
US: State of the Law
Alasaad v. DHS
US: Access to the Cloud
US: Password Fingerprint
Legislation
European Union
Threat Models
Before You Arrive at the Border
Be Careful about Consent
After the Border
Technological Measures
Grayshift Customers
Apple's Response USB Restricted Mode
Device Encryption Usage Tips
Secure Deletion
Trusted Boot
Cloud Storage
Taught by
0xdade
Related Courses
Activos, amenazas y vulnerabilidadesGoogle via Coursera Side-Channel Security: Developing a Side-Channel Mindset
Graz University of Technology via edX Cybersecurity: Protecting your Information at Home
Kennesaw State University via Coursera Create a Professional Online Presence
University of Leeds via FutureLearn Computers and the Internet in Society
DeAnza College via California Community Colleges System