Last time, I covered the first part of the Electronic Frontier Foundation's (EFF) Digital Privacy at the U.S. Border guide. Now, I am going to cover the second part of their series, which focuses on the legal framework around searches and seizures at the border.
Keep in mind, this is only meant to be a primer. If you have deep concerns about these issues and need a greater level of detail, it might be best to consult a lawyer.
Continue reading Injustice at the Border: How to Protect Your Data (Part 3)
In regard to software, there are several kinds of applications that I need, and I have been happy to see increasingly good Linux counterparts available. In the next parts of this series, I am going to briefly cover some of the best ones I have found.
Continue reading Hello Again: Mac Thoughts (Part 4)
This post is part of a multi-part series on Linux.
Last time, we explored several archiving and compressing programs that can be used on Linux. Now, we are going to tackle the Linux directory hierarchy.
Continue reading Digging Deep With Linux (Part 11)
Since I wrote the first part of this series, the Electronic Frontier Foundation (EFF) has released a superlative guide on digital privacy at the U.S. Border. They have done things like this before, but since the legal context around these issues is somewhat labile, it is important to make sure you are getting up-to-date information.
Before I move on to my own technical solution for moving across borders, I think it is beneficial to review the EFF's Guide. Their post about this guide can be found here. It is broken up into 3 parts:
- Digital Privacy Guide for Travelers
- Constitutional Rights, Government Policies, and Privacy at the Border
- The Technology of Privacy Protection
Here, I am going to focus on the first 2 parts, and the last part of this series will basically be my take on part 3 of their guide.
Much of the information presented will be useful to any traveler, but I am writing this from the perspective of a deeply concerned U.S. citizen, and will correspondingly focus on aspects that affect this cohort.
Continue reading Injustice at the Border: How to Protect Your Data (Part 2)