Crossing the Border With Your Electronic Devices
Offered By: 0xdade via YouTube
Course Description
Overview
Explore the critical issues surrounding digital privacy and security at national borders in this 49-minute conference talk from Shmoocon 2020. Delve into the legal and policy challenges of border searches, and discover technological measures to protect personal data while traveling. Learn about the implications of digital device searches for security researchers and the general public, covering topics such as the border search exception, recent legal developments, and practical tips for safeguarding sensitive information. Gain insights from Electronic Frontier Foundation experts Bill Budington and Kurt Opsahl on balancing privacy rights with border security concerns, and understand the importance of protecting digital rights in an increasingly connected world.
Syllabus
Intro
Why is Security and Privacy Important for Digital Devices?
It's a Window into Your Soul
Digital Devices Can Hold Privileged Information
There's a Bad Moon on the Rise
Bureaucracy of Border Search
Extreme Vetting
US: Border Search Exception
Supreme Court Steps Up
US: State of the Law
Alasaad v. DHS
US: Access to the Cloud
US: Password Fingerprint
Legislation
European Union
Threat Models
Before You Arrive at the Border
Be Careful about Consent
After the Border
Technological Measures
Grayshift Customers
Apple's Response USB Restricted Mode
Device Encryption Usage Tips
Secure Deletion
Trusted Boot
Cloud Storage
Taught by
0xdade
Related Courses
Introduction to Personal BrandingUniversity of Virginia via Coursera Health Professional Teaching Skills – Level 3 - Professionalism
University of Toronto via edX Privacy, Reputation, and Identity in a Digital Age Teach-Out
University of Michigan via Coursera Protection de la vie privée dans le monde numérique
Inria (French Institute for Research in Computer Science and Automation) via France Université Numerique Tatort Internet - Angriffsvektoren und Schutzmaßnahmen
openHPI