Re: [liberationtech] best practices - roundup

2012-10-11 Thread The Doctor
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 10/09/2012 03:03 PM, Lindsay Beck wrote: Thanks for compiling these resources! Another great tool that is perfect for traveling is TAILS, which stands for The Amnesiac Incognito Live System ... For what it's worth, I was traveling OCONUS last

[liberationtech] best practices - roundup

2012-10-09 Thread Katy P
Best practices for traveling to an internet-hostile regime. There is a lot of variance - obviously the regime's capabilities as well as one's own visibility come into play. And, if it isn't obvious, I'm not a security expert. This is not official, legal advice. Everyone needs to research this on

Re: [liberationtech] best practices - roundup

2012-10-09 Thread Parker Higgins
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi Katy, Excellent list. Sorry I'm late to the game, but if you're traveling to one Internet hostile regime in particular -- and here, I'm referring to the US -- you or others may find this EFF whitepaper on border crossing to be useful.

Re: [liberationtech] best practices - roundup

2012-10-09 Thread Fran Parker
Thanks Parker! I was hoping someone would post some of these best practices as an article or white paper link. On 10/9/12 1:28 PM, Parker Higgins wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi Katy, Excellent list. Sorry I'm late to the game, but if you're traveling to one Internet

Re: [liberationtech] best practices - roundup

2012-10-09 Thread liberationtech
On Tue, 9 Oct 2012 09:23:58 -0700 Katy P katyca...@gmail.com wrote: Best practices for traveling to an internet-hostile regime. There is a lot of variance - obviously the regime's capabilities as well as one's own visibility come into play. https://ssd.eff.org/ is a fine start for most

Re: [liberationtech] best practices - roundup

2012-10-09 Thread Maxim Kammerer
On Tue, Oct 9, 2012 at 9:03 PM, Lindsay Beck lb...@ndi.org wrote: Disclosure: TAILS relies on BIOS for operability, and thus can have challenges functioning on newer computers that utilize UEFI without legacy support for BIOS. For anyone interested: Liberté Linux already has full UEFI support

Re: [liberationtech] best practices - roundup

2012-10-09 Thread Steve Weis
I hadn't seen Tails before and don't know how baked it is as a project. I just tried it out and found an exploitable vulnerability in their configuration that would allow someone to compromise the system. It's a corner case and not likely to impact many systems, but is a well known problem. I've

Re: [liberationtech] best practices - roundup

2012-10-09 Thread Jacob Appelbaum
Maxim Kammerer: On Tue, Oct 9, 2012 at 9:03 PM, Lindsay Beck lb...@ndi.org wrote: Disclosure: TAILS relies on BIOS for operability, and thus can have challenges functioning on newer computers that utilize UEFI without legacy support for BIOS. For anyone interested: Liberté Linux already has

Re: [liberationtech] Best practices

2012-10-05 Thread Andrew Lewis
I'd at least wipe my phone, if not just get a burner. I suppose encryption is also an option, so that you can preload it with security apps. -Andrew On Oct 5, 2012, at 7:02 AM, Katy P katyca...@gmail.com wrote: Hi LibTech. With a certain event coming up, I'm interesting in creating a best

Re: [liberationtech] Best practices

2012-10-05 Thread Katrin Verclas
Depends on your threat model but since since I think I know what country your are talking about, might be worth taking more precautions: * burner phone * wiped disposable laptop w Tor etc * trusted VPN (maybe) * bootable linux like TAILS * possibly encryption but frowned upon if not outright

Re: [liberationtech] Best practices

2012-10-05 Thread Robert Guerra
A key recommendations when visiting countries where repression against activists is well documented is to minimize exposure of data, be it from your devices or social media accounts (1) travel pc's Machines can get compromised by malware, theft or sabotage. As such, steps should be taken to