|
|
|
Schneier on US Customs Notebook Searches Do not follow the rules |
Si vous voulez bloquer ce service sur vos fils RSS
Si vous voulez nous contacter ou nous proposer un fil RSS
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Présentation : Body I just read this article by Bruce Schneier on what to do about US Customs searches Taking your laptop into the US Be sure to hide all your data first So, if you look at part of his recommendations, they are You're going to have to hide your data. Set a portion of your hard drive to be encrypted with a different key - even if you also encrypt your entire hard drive - and keep your sensitive data there. consider putting your sensitive data on a USB drive or even a camera memory card even 16GB cards are reasonably priced these days. Encrypt it, of course, because it's easy to lose something that small. Slip it in your pocket, and it's likely to remain unnoticed even if the customs agent pokes through your laptop. If someone does discover it, you can try saying I don't know what's on there. My boss told me to give it to the head of the New York office. If you've chosen a strong encryption password, you won't care if he confiscates it. So, if you look at the two recommendations above, he actually tells you to lie at the customs control and try to hide data away from the officials So, he suggests that you are committing a crime. Pretty risky game, isn't it. Well, to be fair He gives another advice as well, which is using a forensically clean notebook and download the data from you corporate network once you crossed the border. This is a legal and safe practice. Do not get me wrong I do not like the rules of the US customs at all not that they are alone, other countries do the same as they simply are not on the standard for a developed country with a sound legal system. I do not have a problem if they search a notebook based on a court ruling with reasonable suspicion. But to do it just because the officer at customs had a bad night and does not feel well is not up to the standard the US measures the rest of the world. This is no reason however, to become commit a criminal activity. Roger Category Cybercrime Policies ProcessesPublished 16.05.2008 08 35
Les mots clés de la revue de presse pour cet article : notebook
Les derniers articles du site "Roger Halbheer on Security" :
- Security Risks of VoIP - Security Compliance Management Beta Available - Building a faster Internet - End-To-End Trust We want your Feedback - Forefront Codename Stirling Beta ready for Download - How long does it take to hack a Power Plant - The Security Business has no Future Quote by IBM - Office Binary Formats on the Web - SDL and End to End Trust - The ideal profile of a CSO
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Si vous voulez bloquer ce service sur vos fils RSS :
- avec iptables "iptables -A INPUT -s 88.191.75.173 --dport 80 -j DROP"
- avec ipfw et wipfw "ipfw add deny from 88.191.75.173 to any 80"
- Nous contacter par mail
| Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
| Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
| Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
| Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|