How to Protect Your Phone While Traveling Abroad

8 Min Read

When I travel to Asia this summer, I plan to leave my iPhone at home. Instead, I will pack a different phone that lacks my basic applications, such as Instagram, Slack and Signal. He won only logging into my work email.

No, I am not planning digital detoxification. I am I choose to travel with what is known as a burner phone because my personal device contains confidential data that I do not want the ethers, particularly the border protection officers of the United States, seek.

For more than a decade, the Federal Government has had the authority to border on the personal electronics of travelers, including phones, laptops and tablets. In recent years, such inspections have increased constantly, although they only have a small portion of people entering the United States.

Last year, the US Customs and Protection Agency.

To be clear, I can be particularly paranoid as a journalist who constantly works to protect the confidential sources of being overcome, so a burner phone is an extreme measure that most people won or most necessary.

But in recent incidents, travelers have denied the entry of legs into the United States in part due to telephone data, such as weapons photos and publications on social networks about protests.

“The biggest concern is that the Government can highlight the people that it is to search,” said Esha Bhandari, lawyer of the American Union of Civil Liberties. “We have seen an anecdotal evidence for more aggressive searches on the border, including lawyers who have privileges of customer clients and people considered dissidents.”

In other words, although no rule has changed when it comes to entering the United States, a change in the frequency with which policies are applied can be underway. Vacationers and business travelers must be judicious about the data they carry out on their devices.

There is no unique solution for everyone, and the approach that works best for you depends on your lifestyle and professional. This is what you should do.

Evaluate your risk

First consider who you are, what to work and what is on your phone, laptop or tablet, said Jeremiah Grossman, a cybersecurity expert.

If, for example, you are a retired American citizen who takes some vacation photos and text conversations with friends from your reading club on your device, you probably don’t have to worry. But if you are a student with a visa that has bones involved in government protests, there may be media on your phone that could create problems.

“If the police had everything on your phone and access to everything, would it be bad for you?” Grossman said.

From there, evaluate whether your risk is high or low and choose an approach.

Under risk: Use an access code and delete some applications

If you are only slightly concerned about your data that are sought, it begins with extinguishing biometry, such as digital and face fingerprint recognition sensors. Instead, trust only an access code to unlock your device.

To turn off the identification of the face on an iPhone, open the configuration application, touch FACE ID AND ACCESS CODEEnter your pass code and deactivate the switch to IPhone unlock.

For Android phones, the steps depend on the model, but usually in the configuration application you can write a search for the Unlocking of the face and the fingerprint Menu and disable the configuration there.

Using only an access code can be an effective measure for US citizens because it is more difficult for the government to force him to share an approval code than an officer who takes his phone and keeps him on the face to unlock it, Bhandari said.

But while citizens can refuse to provide a pass code, visa holders and tourists visiting the United States run the risk of the entrance if they refuse to meet, added Mrs. Bhandari. Therefore, it is better to take the additional step to eliminate any application that contains information that may be problematic, such as Instagram, Signal or X.

Average risk: support and purge your data

If you think there is a modest possibility that the government can search on your phone, consider making a copy of a copy of all your data and purge your device before returning to the United States, Grossman said.

To simplify this process, you can make a backup of your data to an online server, such as Apple Iphones or Google One for Android devices. That way, then you can restore your data through the Internet, enter the credentials of your account.

To make a backup of your data on an iPhone to ICloud, open the Settings Application, play you nametap Icloud and select Icloud backup. Light Make a backup copy of this iPhone and touch Back now. Then, to purge the data of your iPhone, in the configuration application you go to the General Menu, touch Transfer or restore iPhonetap Delete all content and configuration And follow the steps.

To make a backup of your data on an Android device for Google One, open the Settings Application, touch GoogleThen touch Back. To purge your Android data, the steps depend on the model of your phone, but you can generally do a search for the Factory restart Menu in the configuration application.

After crossing the edge with the cleaned device, you will see an option to restore the device from a backup when you are going to configure it, in which you can enter the credentials of your account to recover your data. (Just be sure to write your password somewhere).

High risk: carry a burner phone

If you think it is very likely that US border officials.

This is how to do it.

  • I will carry a cheap Android phone with only the necessary software for my trip, including transport and maps applications.

  • I will start a session in an email account that I created exclusive to travel to recover itineraries and other travel relationship information.

  • When you land, I will connect to a temporary cell plan on a foreign network using an ESIM, a digitized version of a SIM card, which can be activated through an application like Nomad, Airalo or Gigsky. (I wrote a guide to use ESIM technology in an anterior column).

Then, when I return home, I will copy all my vacation phone photos to my iPhone and put the burner in a drwer until my next trip.

About The Author