Skip to main content
Tech Radar TechRadar the technology experts
Sign in
  • View Profile
  • Sign out
RSS
Asia
flag of Singapore
Singapore
Europe
flag of Danmark
Danmark
flag of Suomi
Suomi
flag of Norge
Norge
flag of Sverige
Sverige
flag of UK
UK
flag of Italia
Italia
flag of Nederland
Nederland
flag of België (Nederlands)
België (Nederlands)
flag of France
France
flag of Deutschland
Deutschland
flag of España
España
North America
flag of US (English)
US (English)
flag of Canada
Canada
flag of México
México
Australasia
flag of Australia
Australia
flag of New Zealand
New Zealand
  • Phones
  • Computing
  • TVs
  • AI
  • Streaming
  • Health
  • Audio
  • VPN
  • More
    • Cameras
    • Home
    • News
    • Reviews
    • Opinion
    • How to
    • Versus
    • Deals
    • Coupons
    • Best
Tech Radar Pro
Tech Radar Gaming
Trending
  • Nintendo Switch 2
  • WWDC
  • Best laptop
  • Best VPN
  • ChatGPT
  • Best web hosting
  • NYT Wordle today

Recommended reading

ransomware avast
Security When it comes to security, public Wi-Fi could be a risky choice for commuters worldwide
A computer file surrounded by red laser beams
VPN Privacy & Security Cover your tracks: the risk of sending unencrypted files
Infosec Europe 2025 header
Security Infosec Europe 2025: here's everything we saw
Google Chrome app is seen on an iPhone next to Edge and other web browser apps. Microsoft is using new prompts in Edge to try and stop users from downloading Chrome.
Software & Services I reviewed hundreds of apps for a living, and these are the security features that best protect your data
A representational concept of a social media network
VPN Services Living in the US? You can now measure your online data exposure for free
AI security shield
Pro Security & data protection: when two become one
Fingerprint
Pro Why your biometric data will soon be more valuable than money
  1. Computing
  2. Computing Security

How to protect your data when traveling

How-to
By Nate Drake published 15 April 2017

Don't compromise your security

When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

How to protect your data when traveling

How to protect your data when traveling

While officials usually need a warrant to invade your privacy and search your devices, border check points operate in a legally grey area. Warrantless searches have been found to be legal when entering the USA for instance.

In this guide we'll explore ways to keep your data safe across borders. Bear in mind that some countries have laws which require you to hand your device passwords over and refusal can lead to you being detained or denied entry altogether. Explore your options to make sure that you can both stay within the law and keep your data safe. 

  • Get rewards for your next trip with the best credit cards for travel (US only)
Page 1 of 6
Page 1 of 6
1. Unplug

1. Unplug

Your simplest and most effective option to protect your devices from being seized is not to bring any.

Once you have cleared Customs, you can either buy or rent a device in your destination country. This may not be suitable for places where technology is expensive or difficult to get hold of.

If you have no phone or laptop, your friends and colleagues also won't be able to contact you as easily. Consider buying a basic prepay phone and SIM card at the airport so you can stay in touch or contact them via a pay phone. 

Page 2 of 6
Page 2 of 6
2. Restore from Cloud

2. Restore from Cloud

If you don't want to unplug altogether, consider backing up your data to the Cloud then resetting your device. Even if your device is seized it will be almost impossible to recover your personal data. Once you're safely cross the border, you can then re-download your information.

Apple devices lend themselves particularly well to this as you can back up and restore data from iCloud. (See our guide on how to back up your iPhone and iPad). 

For computers, install a cloud storage client. Check out our roundup of the best cloud storage providers of 2017 if you need help with this.

Page 3 of 6
Page 3 of 6
3. Encrypt and authenticate mobile devices

3. Encrypt and authenticate mobile devices

If you don't trust your data to the cloud, you can encrypt your device so that no one can access it without the correct passcode. Apple devices such as iPhones do this by default. See our guide on how to do this for Android devices.

If you're worried you'll be forced to hand over the password, set up Two Factor Authentication on your Apple or Android device but leave your SIM card with someone you trust. Without both the 2FA code and your passcode, no one can sign in with your Apple ID/Google Account.

Page 4 of 6
Page 4 of 6
4. Use plausible deniability

4. Use plausible deniability

While you can encrypt your devices to make data irretrievable, anyone inspecting them will know you have something to hide, even if they don't know what it is. 

Certain computer encryption programs such as Veracrypt offer a solution through plausible deniability. 

Essentially this involves creating two passwords for an encrypted drive. One will display an 'outer' volume into which you can place some plausible dummy data. The other password reveals your 'hidden' volume which you use to access your real information.

Plausible deniability can be tricky to achieve in practice, see Veracrypt's website  for more information on how to set this up. 

Page 5 of 6
Page 5 of 6
5. Snail mail

5. Snail mail

While border checkpoints may operate in a legally grey area, many countries have much stricter rules about sending items by post. In the US for instance, many categories of mail can only be searched with a valid warrant. 

If can afford the courier fees and have someone you trust in your destination country, you can mail a cellphone, USB stick or even an entire laptop and retrieve it on the other side.

Consider wiping or encrypting your devices before mailing, so that if they're intercepted your data will still be safe.

Page 6 of 6
Page 6 of 6
Nate Drake

Nate Drake is a tech journalist specializing in cybersecurity and retro tech. He broke out from his cubicle at Apple 6 years ago and now spends his days sipping Earl Grey tea & writing elegant copy.

See more Computing How Tos
Read more
ransomware avast
When it comes to security, public Wi-Fi could be a risky choice for commuters worldwide
A computer file surrounded by red laser beams
Cover your tracks: the risk of sending unencrypted files
Infosec Europe 2025 header
Infosec Europe 2025: here's everything we saw
Google Chrome app is seen on an iPhone next to Edge and other web browser apps. Microsoft is using new prompts in Edge to try and stop users from downloading Chrome.
I reviewed hundreds of apps for a living, and these are the security features that best protect your data
A representational concept of a social media network
Living in the US? You can now measure your online data exposure for free
AI security shield
Security & data protection: when two become one
Latest in Computing Security
Poland's Prime Minister Donald Tusk attend a joint press conference with the European Commission President after a meeting of the College of Commissioners with members of the Polish government in Gdansk, Poland on February 7, 2025.
Chat Control – Poland's EU Presidency gives up on the voluntary scan of your encrypted chats
The eyes of Big Brother is watching secretly from behind the digital curtain of the EU flag
Experts "deeply concerned" by the EU plan to weaken encryption
In this photo illustration the Meta logo and European Union flag are displayed on a mobile phone screen
"Meta AI non-compliant with GDPR" – Digital rights group menaces Meta with injunction over EU AI training
In this photo illustration, the Meta AI logo is seen displayed on a smartphone screen
German consumer protection group calls on Meta to halt its AI training in the EU – will other countries follow suit?
Apple
US lawmakers slam UK encryption backdoor order to Apple, warning against "systemic vulnerabilities"
EU
Chat Control 2.0? Experts urge the EU not to undermine encryption with new ProtectEU plan
Latest in How Tos
LONDON, ENGLAND - JUNE 12: Wimbledon tennis balls sit ready on the Queens Club practice court at The Queen's Club on June 12, 2025 in London, England.
How to watch Wimbledon with Hulu+Live TV – stream the tennis and grab a free trial
James Lowe and Jordie Barrett in the URC semi-final against Scarlets for Leinster.
How to watch Leinster vs Bulls for FREE — live stream 2025 United Rugby Championship Final from anywhere
Charles Leclerc and Max Verstappen racing at the Spanish Grand Prix in Barcelona
How to watch Canadian Grand Prix on Servus On (it's free)
Ollie Lawrence, Finn Russell and Ben Spencer celebrating a try against Bristol in the semi-final of the Gallagher Premiership.
How to watch Bath vs Leicester: Live stream 2025 Gallagher Premiership final rugby for FREE
Rory McIlroy using his driver for a tee shot at the US Open.
US Open 2025 live stream: how to watch the golf online, schedule, Round 2 tee times
Australian players celebrate winning the 2003 World Test Championship with the mace awarded to the winners
How to watch World Test Championship Final 2025 online: Australia vs South Africa
LATEST ARTICLES
  1. 1
    Don't call it a Mac – I went hands-on with iPadOS 26 with true multitasking, a revamped Files, and a menu bar, here's what you need to know
  2. 2
    Our favorite budget audiophile brand has a new affordable hi-res music player, with a desktop mode to make it part of your hi-fi setup
  3. 3
    Experts warn clicking "unsubscribe" on that boring email could actually be a security risk - here's why
  4. 4
    Amazon's Fire TV Soundbar is one of the best on the market, and it's down to a record-low price
  5. 5
    I tried doing improv with ChatGPT, it did not make it funnier

TechRadar is part of Future US Inc, an international media group and leading digital publisher. Visit our corporate site.

  • About Us
  • Contact Future's experts
  • Contact Us
  • Terms and conditions
  • Privacy policy
  • Cookies policy
  • Advertise with us
  • Web notifications
  • Accessibility Statement
  • Careers

© Future US, Inc. Full 7th Floor, 130 West 42nd Street, New York, NY 10036.

Please login or signup to comment

Please wait...