With all of the things that people have to worry about before they travel, it’s no surprise data security barely rates a second thought.
Take a minute to think of all of the information on your laptop. It’s not just photos and private documents, but saved passwords, browser history, and all sorts of other things you’d rather not put into the hands of malicious strangers or government officials looking for an excuse to make your life difficult.
The answer? Data encryption.
What is Encryption Anyway?
In simple terms, encryption is a way of scrambling your data. Unscrambling it requires a password, fingerprint, or other security mechanism, and without that, it remains unreadable even to people with physical access to the device it’s stored on.
I use a free, open-source product called Veracrypt to protect data on both my laptop and portable drive. I could do the same with my USB key as well, or buy one with hardware encryption built in, but instead just choose to not store anything of value on it.
There are essentially two options when it comes to what you encrypt — the entire drive, or a subset of it — with pros and cons to both.
|Full drive encryption|| |
You don’t need to remember to encrypt important files, since everything is automatically secured.
Because a password is required as soon as the computer is turned on, a thief can’t use it at all. I like this.
If a government official wants to look at the contents of your laptop, you may not be able to hide the existence of encrypted data.
Some encryption software can slow down your computer.
Some backup software won’t recognise an encrypted destination drive.
Because thieves can’t use the computer, tracking software such as Prey won’t help find it.
|Partial drive encryption|| |
Easy to set up.
A drive or computer can be inspected by officials without the existence of an encrypted partition being obvious.
Only those files (including system and configuration files) stored in the encrypted part of the drive are protected
Laptops may still be usable by thieves
Personally I opt for full drive encryption. While offering the greatest security and ease of use, this does mean however that if I am ever stopped at the border with demands to see the contents of my electronics I won’t be able to deny the existence of an encrypted drive.
Immigration officials in Australia, the USA, Canada, and several other countries regularly like to poke around traveler’s laptops without worrying about minor details like “probable cause”, so I don’t assume it won’t happen.
Fortunately it is possible to have the best of both worlds by setting up an encrypted container within your encrypted drive. This means that I could still keep particularly sensitive data secure and invisible while being able to decrypt and hand over my laptop or hard drive for inspection.
All that may sound like overkill, but with every country having different rules about what may or may not be acceptable, it’s a conversation I’d just rather not have to have at the border (or anywhere else).
A little bit of time setting everything up before I started traveling has provided me with peace of mind ever since, which seems like a worthwhile investment.
Still, the day your laptop gets stolen from your hotel room or a border guard decides to single you out, you’ll be very pleased to know your confidential data will still remain secure.
Do you encrypt any of your devices when you travel? Why or why not?