Skip to main content
Tech Radar TechRadar the technology experts
Sign in
  • View Profile
  • Sign out
RSS
Asia
flag of Singapore
Singapore
Europe
flag of Danmark
Danmark
flag of Suomi
Suomi
flag of Norge
Norge
flag of Sverige
Sverige
flag of UK
UK
flag of Italia
Italia
flag of Nederland
Nederland
flag of België (Nederlands)
België (Nederlands)
flag of France
France
flag of Deutschland
Deutschland
flag of España
España
North America
flag of US (English)
US (English)
flag of Canada
Canada
flag of México
México
Australasia
flag of Australia
Australia
flag of New Zealand
New Zealand
  • Phones
  • Computing
  • TVs
  • AI
  • Streaming
  • Health
  • Audio
  • VPN
  • More
    • Cameras
    • Home
    • News
    • Reviews
    • Opinion
    • How to
    • Versus
    • Deals
    • Coupons
    • Best
Tech Radar Pro
Tech Radar Gaming
Trending
  • Amazon Prime Day
  • Back to school
  • Nintendo Switch 2
  • Best VPN
  • ChatGPT
  • NYT Wordle today
  • Best laptop
  • Best web hosting
Recommended reading
Pink iPhone chained up
Phones Worried about phone snatchers? These 5 invaluable iPhone and Android settings will keep you safe and connected this summer
Public USB
Security The TSA has issued an urgent warning about criminals using fake USB charging ports, free Wi-Fi honeypots to steal your identity ahead of summer holidays
Network Security
Pro “We’re in an era of consistent attack” - how offline storage architecture could save your business
laptop being stolen
Security Thousands of PCs, phones and tablets stolen and lost by UK public sector bodies prompting fears of huge national security risk
Pro Many of us feel vulnerable connecting to public Wi-Fi while traveling abroad - which is why I always pick an eSIM
Infosec Europe 2025 header
Security Infosec Europe 2025: here's everything we saw
Google Chrome app is seen on an iPhone next to Edge and other web browser apps. Microsoft is using new prompts in Edge to try and stop users from downloading Chrome.
Software & Services I reviewed hundreds of apps for a living, and these are the security features that best protect your data
  1. Computing
  2. Computing Security

How to protect your data when traveling

How-to
By Nate Drake published 15 April 2017

Don't compromise your security

When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

How to protect your data when traveling

How to protect your data when traveling

While officials usually need a warrant to invade your privacy and search your devices, border check points operate in a legally grey area. Warrantless searches have been found to be legal when entering the USA for instance.

In this guide we'll explore ways to keep your data safe across borders. Bear in mind that some countries have laws which require you to hand your device passwords over and refusal can lead to you being detained or denied entry altogether. Explore your options to make sure that you can both stay within the law and keep your data safe. 

  • Get rewards for your next trip with the best credit cards for travel (US only)
Page 1 of 6
Page 1 of 6
1. Unplug

1. Unplug

Your simplest and most effective option to protect your devices from being seized is not to bring any.

Once you have cleared Customs, you can either buy or rent a device in your destination country. This may not be suitable for places where technology is expensive or difficult to get hold of.

If you have no phone or laptop, your friends and colleagues also won't be able to contact you as easily. Consider buying a basic prepay phone and SIM card at the airport so you can stay in touch or contact them via a pay phone. 

Page 2 of 6
Page 2 of 6
2. Restore from Cloud

2. Restore from Cloud

If you don't want to unplug altogether, consider backing up your data to the Cloud then resetting your device. Even if your device is seized it will be almost impossible to recover your personal data. Once you're safely cross the border, you can then re-download your information.

Apple devices lend themselves particularly well to this as you can back up and restore data from iCloud. (See our guide on how to back up your iPhone and iPad). 

For computers, install a cloud storage client. Check out our roundup of the best cloud storage providers of 2017 if you need help with this.

Page 3 of 6
Page 3 of 6
3. Encrypt and authenticate mobile devices

3. Encrypt and authenticate mobile devices

If you don't trust your data to the cloud, you can encrypt your device so that no one can access it without the correct passcode. Apple devices such as iPhones do this by default. See our guide on how to do this for Android devices.

If you're worried you'll be forced to hand over the password, set up Two Factor Authentication on your Apple or Android device but leave your SIM card with someone you trust. Without both the 2FA code and your passcode, no one can sign in with your Apple ID/Google Account.

Page 4 of 6
Page 4 of 6
4. Use plausible deniability

4. Use plausible deniability

While you can encrypt your devices to make data irretrievable, anyone inspecting them will know you have something to hide, even if they don't know what it is. 

Certain computer encryption programs such as Veracrypt offer a solution through plausible deniability. 

Essentially this involves creating two passwords for an encrypted drive. One will display an 'outer' volume into which you can place some plausible dummy data. The other password reveals your 'hidden' volume which you use to access your real information.

Plausible deniability can be tricky to achieve in practice, see Veracrypt's website  for more information on how to set this up. 

Page 5 of 6
Page 5 of 6
5. Snail mail

5. Snail mail

While border checkpoints may operate in a legally grey area, many countries have much stricter rules about sending items by post. In the US for instance, many categories of mail can only be searched with a valid warrant. 

If can afford the courier fees and have someone you trust in your destination country, you can mail a cellphone, USB stick or even an entire laptop and retrieve it on the other side.

Consider wiping or encrypting your devices before mailing, so that if they're intercepted your data will still be safe.

Page 6 of 6
Page 6 of 6
Nate Drake

Nate Drake is a tech journalist specializing in cybersecurity and retro tech. He broke out from his cubicle at Apple 6 years ago and now spends his days sipping Earl Grey tea & writing elegant copy.

See more Computing How Tos
Read more
Pink iPhone chained up
Worried about phone snatchers? These 5 invaluable iPhone and Android settings will keep you safe and connected this summer
Public USB
The TSA has issued an urgent warning about criminals using fake USB charging ports, free Wi-Fi honeypots to steal your identity ahead of summer holidays
Network Security
“We’re in an era of consistent attack” - how offline storage architecture could save your business
laptop being stolen
Thousands of PCs, phones and tablets stolen and lost by UK public sector bodies prompting fears of huge national security risk
Many of us feel vulnerable connecting to public Wi-Fi while traveling abroad - which is why I always pick an eSIM
Infosec Europe 2025 header
Infosec Europe 2025: here's everything we saw
Latest in Computing Security
A phone showing the download page for Microsoft Authenticator
Microsoft is phasing out passwords soon – here's why passkeys are replacing them and what to do next
A person holding a phone looking at a scam text with warning signs around
FBI issues urgent warning about new SMS toll scam – here's how to spot it and what to do
Poland's Prime Minister Donald Tusk attend a joint press conference with the European Commission President after a meeting of the College of Commissioners with members of the Polish government in Gdansk, Poland on February 7, 2025.
Chat Control – Poland's EU Presidency gives up on the voluntary scan of your encrypted chats
The eyes of Big Brother is watching secretly from behind the digital curtain of the EU flag
Experts "deeply concerned" by the EU plan to weaken encryption
In this photo illustration the Meta logo and European Union flag are displayed on a mobile phone screen
"Meta AI non-compliant with GDPR" – Digital rights group menaces Meta with injunction over EU AI training
In this photo illustration, the Meta AI logo is seen displayed on a smartphone screen
German consumer protection group calls on Meta to halt its AI training in the EU – will other countries follow suit?
Latest in How Tos
Novak Djokovic plays a forehand at Wimbledon 2025
How to watch Evans vs Djokovic online: live stream Wimbledon 2025 tennis FREE
Google Chrome logo on desktop and mobile
How to private browse in Chrome on Windows, Android and ChromeOS
The ball for Women's Euro 2025
How to watch Women's Euro 2025: live stream soccer options, TV channels, watch for FREE, Day 2 fixtures
Coco Gauff practicing for Wimbledon 2025
How to watch Yastremska vs Gauff at Wimbledon 2025 on BBC iPlayer (it's free)
Jamie Smith and Joe Root celebrate after walking off unbeaten in their test victory against India at Headingley, Leeds.
How to watch England vs India 2nd Test: Live stream cricket online – India 310-5 after Day 1 Gill century
Emma Raducanu preparing for Wimbledon 2025
How to watch Raducanu vs Xu online: live stream Wimbledon 2025 tennis FREE
LATEST ARTICLES
  1. 1
    3 new Max movies to stream with over 94% on Rotten Tomatoes in July 2025
  2. 2
    Security breach reveals Catwatchful spyware is snooping on thousands of phones - here's how to stay safe
  3. 3
    Nobody wants 8GB GPUs from Nvidia and AMD – and this retailer just made that clear
  4. 4
    Netflix just added my favorite sci-fi thriller series in July – here’s why you should make it your next binge watch
  5. 5
    An unannounced MMO from The Elder Scrolls Online developer has been canceled by Xbox after seven years of work

TechRadar is part of Future US Inc, an international media group and leading digital publisher. Visit our corporate site.

  • About Us
  • Contact Future's experts
  • Contact Us
  • Terms and conditions
  • Privacy policy
  • Cookies policy
  • Advertise with us
  • Web notifications
  • Accessibility Statement
  • Careers

© Future US, Inc. Full 7th Floor, 130 West 42nd Street, New York, NY 10036.

Please login or signup to comment

Please wait...