Search Mailing List Archives

Limit search to: Subject & Body Subject Author
Sort by: Reverse Sort
Limit to: All This Week Last Week This Month Last Month
Select Date Range     through    

[liberationtech] best practices - roundup

Lindsay Beck lbeck at
Tue Oct 9 12:03:04 PDT 2012

Hi Katy,

Thanks for compiling these resources! Another great tool that is perfect
for traveling is TAILS, which stands for The Amnesiac Incognito Live System
( TAILS is a bootable Linux USB that
automatically routes your Internet connection through the Tor network and
wipes its memory clean after each use. Through its design, it makes users
automatically follow many best practices in digital safety, such as
securely delete unused files, use a trusted circumvention tool, etc.

Disclosure: TAILS relies on BIOS for operability, and thus can have
challenges functioning on newer computers that utilize UEFI without legacy
support for BIOS. But this is something that will be fixed in the coming
months with NDI's support.


On Tue, Oct 9, 2012 at 1:30 PM, Fran Parker <lilbambi at> wrote:

> Thanks Parker! I was hoping someone would post some of these best
> practices as an article or white paper link.

> On 10/9/12 1:28 PM, Parker Higgins wrote:
>> Hash: SHA1
>> Hi Katy,
>> Excellent list. Sorry I'm late to the game, but if you're traveling to
>> one Internet hostile regime in particular -- and here, I'm referring
>> to the US -- you or others may find this EFF whitepaper on border
>> crossing to be useful.
>> guide-travelers-carrying-**digital-devices<>
>> Thanks,
>> Parker
>> On 10/9/12 9:23 AM, Katy P wrote:
>>> Best practices for traveling to an internet-hostile regime.
>>> There is a lot of variance - obviously the regime's capabilities as
>>> well as one's own visibility come into play.
>>> And, if it isn't obvious, I'm not a security expert. This is not
>>> official, legal advice. Everyone needs to research this on their
>>> own and make good decisions for themselves. If you're really not
>>> tech-savvy, it might be worthwhile to hook up with a tech-savvy
>>> friend (or IT professional) to do some of these steps.
>>> Regardless, here are some hints from the community:
>>> BEFORE YOUR TRIP - your laptop and mobile device should be ones
>>> that are fresh - factory reset to the original operating system and
>>> best case would be "burners" -- devices that you can factory reset
>>> upon return home (some suggested also using a bootable Linux
>>> install) - do not link your Dropbox, GDrive, or other file service
>>> at any time - do not be logged into GMail, social media sites,
>>> etc. - be careful with what photos you have on your phone (before
>>> leaving the country especially) - have a virus scanner installed -
>>> make sure that all software is up-to-date (Windows Updates, virus
>>> scanner) - any sensitive data/documents should be on a USB drive,
>>> not kept in an obvious place (like throw it in with your toiletries
>>> or something) with an encrypted volume - change all of your
>>> passwords to something very secure before your trip - install TOR -
>>> consider a mobile security app (Here's a review of some Android
>>> ones:
>>> -
>>> encryption may be illegal and may cause more concern
>>> AT THE AIRPORT: - don't be logged into anything - be polite - don't
>>> be nervous
>>> DURING YOUR TRIP - when on WiFi, DNSCrypt
>>>**technology/dnscrypt/<>- set up a VPN
>>> connection - never leave your devices anywhere (even hotel safe) -
>>> assume phone conversations are monitored - turn off GPS - turn on
>>> encryption for your social media sites (Facebook encryption
>>> https.html<>
>>> )
>>>  - - some suggest having a different "burner" social media account
>>> - be careful posting pictures and updates during trip
>>> LEAVING THE COUNTRY - if possible, it might be a good idea to do a
>>> factory reset on devices before going to the airport (??) - upon
>>> return, do factory resets of all devices - change passwords upon
>>> return
>>> Thanks to everyone that made suggestions.
>>> -- Unsubscribe, change to digest, or change password at:
>> - --
>> Parker Higgins
>> Activist
>> Electronic Frontier Foundation
>> Version: GnuPG v1.4.11 (Darwin)
>> Comment: Using GnuPG with Mozilla -
>> 6piCAtmjroMYfS+**vMdXmcWVbJcR8PHo2W93PPuZcWxXuZ**J9oxEkL5X6yDhs8ujcN
>> m0XBK5U19/Sl+6Go18p+**1Wwd6Q0bWLJAYeU4T+**wKHZ6KBTlw9GzadfFKUXdIzp99
>> W+Xpe4ye429AJBxMs+LE/**oJ88Fuu9eD61mwWD++**M6VgXvA2kIsZ+2WGwHdR4xkfP
>> xhnbaQw+**MlFzTBx9W8ZkWcYG6gR4QDIEQxFC+**NczBLYbkEz8uZ8oFFB6raUaBjSN
>> G5zouS3FGvgaaufMMHedp0Aj70aFTg**HYuif4y1e4c47w1D+**h5Fv6ajU5rUbLlbmh
>> mBi056jw5us2N9u7wWjna9z6lUWrPe**4pJVlUb+**lcUgCR2Eg5ezW8dGoaBzQC+Gtg
>> Zg3wNNA34G43D0WuUkzU1m8IQewHXU**sawtji/**RC05YdPXqTER63S02f1iDMbRt1l
>> bn7t4TEmWo8Dbe1AZmls1usi0WOc4p**xflrV2UFvhSVF2RXUVuHC4C9BI5cDy**d83g
>> 1UH6nRtREo9ybwg2OhXQIOTecsDz+**yejU6gWpLMLkhqlBNhLfjrmbqe5aZH**Xq7A/
>> yrNj/wS1m5IAOUnAIf+**mZaRaa6Tggk80qAa/**4EvPySeucGGExFnWiqCVfB3jeJAi
>> MwGq8qRxMxyMcDU3WRTQ
>> =4wVS
>> -----END PGP SIGNATURE-----
>> --
>> Unsubscribe, change to digest, or change password at:
>>  --
> Unsubscribe, change to digest, or change password at:

Lindsay Beck
Senior Program Assistant, ICT Programs
National Democratic Institute (NDI)
lbeck at | +1-202-728-5608 | Twitter: @BeckLindsay | Skype:
lindsay_beck <>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <>

More information about the liberationtech mailing list