Skip to main content
Tech Radar TechRadar the technology experts
Sign in
  • View Profile
  • Sign out
RSS
Asia
flag of Singapore
Singapore
Europe
flag of Danmark
Danmark
flag of Suomi
Suomi
flag of Norge
Norge
flag of Sverige
Sverige
flag of UK
UK
flag of Italia
Italia
flag of Nederland
Nederland
flag of België (Nederlands)
België (Nederlands)
flag of France
France
flag of Deutschland
Deutschland
flag of España
España
North America
flag of US (English)
US (English)
flag of Canada
Canada
flag of México
México
Australasia
flag of Australia
Australia
flag of New Zealand
New Zealand
  • Phones
  • Computing
  • TVs
  • AI
  • Streaming
  • Health
  • Audio
  • VPN
  • More
    • Cameras
    • Home
    • News
    • Reviews
    • Opinion
    • How to
    • Versus
    • Deals
    • Coupons
    • Best
Tech Radar Pro
Tech Radar Gaming
Trending
  • Nintendo Switch 2
  • ChatGPT
  • Best laptop
  • Best VPN
  • NYT Wordle today
  1. Computing
  2. Computing Security

How to protect your data when traveling

How-to
By Nate Drake published 15 April 2017

Don't compromise your security

When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

How to protect your data when traveling

How to protect your data when traveling

While officials usually need a warrant to invade your privacy and search your devices, border check points operate in a legally grey area. Warrantless searches have been found to be legal when entering the USA for instance.

In this guide we'll explore ways to keep your data safe across borders. Bear in mind that some countries have laws which require you to hand your device passwords over and refusal can lead to you being detained or denied entry altogether. Explore your options to make sure that you can both stay within the law and keep your data safe. 

  • Get rewards for your next trip with the best credit cards for travel (US only)
Page 1 of 6
Page 1 of 6
1. Unplug

1. Unplug

Your simplest and most effective option to protect your devices from being seized is not to bring any.

Once you have cleared Customs, you can either buy or rent a device in your destination country. This may not be suitable for places where technology is expensive or difficult to get hold of.

If you have no phone or laptop, your friends and colleagues also won't be able to contact you as easily. Consider buying a basic prepay phone and SIM card at the airport so you can stay in touch or contact them via a pay phone. 

Page 2 of 6
Page 2 of 6
2. Restore from Cloud

2. Restore from Cloud

If you don't want to unplug altogether, consider backing up your data to the Cloud then resetting your device. Even if your device is seized it will be almost impossible to recover your personal data. Once you're safely cross the border, you can then re-download your information.

Apple devices lend themselves particularly well to this as you can back up and restore data from iCloud. (See our guide on how to back up your iPhone and iPad). 

For computers, install a cloud storage client. Check out our roundup of the best cloud storage providers of 2017 if you need help with this.

Page 3 of 6
Page 3 of 6
3. Encrypt and authenticate mobile devices

3. Encrypt and authenticate mobile devices

If you don't trust your data to the cloud, you can encrypt your device so that no one can access it without the correct passcode. Apple devices such as iPhones do this by default. See our guide on how to do this for Android devices.

If you're worried you'll be forced to hand over the password, set up Two Factor Authentication on your Apple or Android device but leave your SIM card with someone you trust. Without both the 2FA code and your passcode, no one can sign in with your Apple ID/Google Account.

Page 4 of 6
Page 4 of 6
4. Use plausible deniability

4. Use plausible deniability

While you can encrypt your devices to make data irretrievable, anyone inspecting them will know you have something to hide, even if they don't know what it is. 

Certain computer encryption programs such as Veracrypt offer a solution through plausible deniability. 

Essentially this involves creating two passwords for an encrypted drive. One will display an 'outer' volume into which you can place some plausible dummy data. The other password reveals your 'hidden' volume which you use to access your real information.

Plausible deniability can be tricky to achieve in practice, see Veracrypt's website  for more information on how to set this up. 

Page 5 of 6
Page 5 of 6
5. Snail mail

5. Snail mail

While border checkpoints may operate in a legally grey area, many countries have much stricter rules about sending items by post. In the US for instance, many categories of mail can only be searched with a valid warrant. 

If can afford the courier fees and have someone you trust in your destination country, you can mail a cellphone, USB stick or even an entire laptop and retrieve it on the other side.

Consider wiping or encrypting your devices before mailing, so that if they're intercepted your data will still be safe.

Page 6 of 6
Page 6 of 6
Nate Drake

Nate Drake is a tech journalist specializing in cybersecurity and retro tech. He broke out from his cubicle at Apple 6 years ago and now spends his days sipping Earl Grey tea & writing elegant copy.

See more Computing How Tos
Read more
ransomware avast
When it comes to security, public Wi-Fi could be a risky choice for commuters worldwide
Hands typing on a keyboard surrounded by security icons
Your passwords aren't the key to protecting your online identity, your email address is
Young man using a smartphone and laptop in a hotel room
Staying in a hotel? Here's why you need a VPN
A man falling into a mobile phone screen.
Safer Internet Day: how to avoid online scams and stay safe online
A computer file surrounded by red laser beams
Cover your tracks: the risk of sending unencrypted files
A representational concept of a social media network
Living in the US? You can now measure your online data exposure for free
Latest in Computing Security
A phone showing the TikTok logo
TikTok hit by a €530 million fine in the EU for illegally sending Europeans' data to China
ChatGPT
Beware, another ChatGPT trend threatens your privacy – here's how to stay safe
AI apps on smartphone screen, finger tapping on DeepSeek app
DeepSeek is "a profound threat" to national security and privacy, according to the US Congress
Double exposure photograph of a portrait of Mark Zuckerberg and a telephone displaying the Meta group s artificial intelligence logo at Kerlouan in Brittany in France on April 11 2025.
Meta is set to train its AI models with Europeans' public data, and you can stop it doing so
A Ghibli-style AI image generated on a smartphone on the left, AI doll trends on Instagram feed on the right
If you want to turn yourself into an AI doll, at least do it safely
Elon Musk and Grok.
Grok AI is under investigation in the EU over potential GDPR violations – here's what you need to know
Latest in How Tos
Lamine Yamal of FC Barcelona celebrates scoring his team's first goal during the UEFA Champions League 2024/25 Semi Final First Leg match between FC Barcelona and FC Internazionale Milano in April 2025
How to watch Inter vs Barcelona: live stream the Champions League semi-final second leg online and on TV today, team news
Flag for VE Day 80th anniversary celebrations. Victory in Europe Day is the day celebrating the formal acceptance by the Allies of World War II of Germany's unconditional surrender of its armed forces on Tuesday, 8 May 1945. It marked the official surrender of all German military operations. A series of celebrations and commemorations are due to take place across the country to mark the anniversary.
How to watch VE Day 80 online from anywhere – flypast, concert, TV channel, schedule
Jayson Tatum #0 of the Boston Celtics makes a pass against the Orlando Magic in Game Five of the Eastern Conference First Round NBA Playoffs at TD Garden in April 2025
How to watch NBA playoff semifinals 2025 online: stream basketball from anywhere
Raphinha of Barcelona celebrates their victory at the end of the Copa del Rey 2025 final match between ahead of tonight's Barcelona vs Inter Champions League semi-final first leg at the Olympic Stadium.
How to watch Barcelona vs Inter for free on TV tonight, team news
Texan Ari Abramowitz and Louis Theroux in The Settlers
How to watch The Settlers online from anywhere – where to stream the Louis Theroux Gaza doc
Canelo Alvarez and William Scull face off ahead of their IBF, WBC and WBO World Super Middleweight titles fight
How to watch Saul 'Canelo' Alvarez vs William Scull: live stream boxing online, main event set to start
LATEST ARTICLES
  1. 1
    Salesforce CEO Marc Benioff slams Microsoft over "horrible things" it did to Slack, warns OpenAI could be next to suffer
  2. 2
    The Epson QL7000 is by far the brightest projector I’ve tested – but how bright do 4K projectors need to be?
  3. 3
    It's Wordle Day, according to its creators, and you can celebrate with a round of Wordle Golf against your friends
  4. 4
    After AI, Nvidia wants to own a slice of that sweet trillion-dollar cybersecurity pie with its new DOCA software platfom
  5. 5
    Five things we learned from the latest Grand Theft Auto 6 trailer

TechRadar is part of Future US Inc, an international media group and leading digital publisher. Visit our corporate site.

  • About Us
  • Contact Future's experts
  • Contact Us
  • Terms and conditions
  • Privacy policy
  • Cookies policy
  • Advertise with us
  • Web notifications
  • Accessibility Statement
  • Careers

© Future US, Inc. Full 7th Floor, 130 West 42nd Street, New York, NY 10036.

Please login or signup to comment

Please wait...