TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

US Border Patrol says they can create central repository of traveler emails

406 点作者 hispanic将近 5 年前

37 条评论

ip26将近 5 年前
Sounds like a call to start crossing the border more frequently- with a suitcase full of &quot;suspicious&quot; drives.<p>How many petabytes of mirroring before the whole operation becomes too expensive to justify?
评论 #24252944 未加载
评论 #24252959 未加载
评论 #24252810 未加载
评论 #24253140 未加载
评论 #24254464 未加载
评论 #24253055 未加载
评论 #24257377 未加载
评论 #24252995 未加载
wffurr将近 5 年前
Too bad neither party shows any signs of reigning in this kind of overreach by CBP. Doesn&#x27;t seem like this can be fixed by voting.
评论 #24252815 未加载
评论 #24252885 未加载
评论 #24253409 未加载
评论 #24252915 未加载
评论 #24255396 未加载
评论 #24253215 未加载
luiperd将近 5 年前
What&#x27;s a reasonable way to protect yourself here? Other than wiping and restoring. Are there any encryption tools, or ways to keep your emails and other data on your device safe?<p>Can CBP make you unlock your own phone?
评论 #24252876 未加载
评论 #24252901 未加载
评论 #24252928 未加载
评论 #24252867 未加载
评论 #24253000 未加载
评论 #24252914 未加载
评论 #24253322 未加载
评论 #24255082 未加载
评论 #24256158 未加载
评论 #24254218 未加载
评论 #24254193 未加载
评论 #24254697 未加载
评论 #24253207 未加载
评论 #24253015 未加载
jarym将近 5 年前
Really, the US system of manually extracting data from peoples physical devices seems so much more old-fashioned compared to the Great Firewall of China.<p>There really isn&#x27;t much difference conceptually between the two systems.
评论 #24253108 未加载
biddlesby将近 5 年前
Is there a list online somewhere of all the crazy shit that can legally happen to you in the US? How long you can be detained for, what data can be extracted from you, and so on? Like if you had a <i>really</i> bad day and the authorities exercised all of the powers over you they legally have.
评论 #24253447 未加载
评论 #24259653 未加载
评论 #24253510 未加载
SippinLean将近 5 年前
There are a handful of state courts in the US that find passwords testimonial, and therefore the Fifth Amendment prevents compelled production of passwords. [1]<p>Could that apply here?<p>1 <a href="https:&#x2F;&#x2F;www.techdirt.com&#x2F;articles&#x2F;20191124&#x2F;09372943445&#x2F;pennsylvania-supreme-court-says-compelled-password-production-violates-fifth-amendment.shtml" rel="nofollow">https:&#x2F;&#x2F;www.techdirt.com&#x2F;articles&#x2F;20191124&#x2F;09372943445&#x2F;penns...</a>
评论 #24253039 未加载
dbg31415将近 5 年前
I&#x27;m going to start traveling with a 10 TB Encrypted NAS full of static. They can download that and save it if they want.<p>What sucks is that I know this is probably being stored on AWS. Tech companies enable this kind of shit, and even push sale of larger and larger systems to governments. And they are massively rewarded for doing so.<p>This isn&#x27;t the government... this is a sales guy at AWS pushing them to store things for 75 years... he knows he gets a helluva commission check on that deal.<p>Gross oversimplification, but not really. We, as technologists, have to take responsibility here.
aboringusername将近 5 年前
The easiest thing to do is to simply not take electronic devices with you anywhere in the world, otherwise there is a slight risk of someone wanting to understand the information contained within it.<p>If you think there is a risk, and you take a device, obviously FDE is a requirement, although, that could be seen as &quot;suspicious&quot;.<p>The easiest thing to do is to fill up TB&#x27;s of HDD&#x27;s with useless information. Random pictures, documents, perhaps thousands of people&#x27;s contact information downloaded from a public source. Store any &quot;important&quot; documents as random file names, perhaps inside archives or volumes that need decrypting. Or not at all, instead &quot;in the cloud&quot; but still encrypted so that you can travel without worrying about somebody accessing your information. Make deliberate &quot;suspicious&quot; file names, make them believe a file is encrypted (a 50GB file named &quot;totally not a hidden volume.hiddenvolume&quot;) and maybe they will waste time trying to open the volume only to realize it contains thousands of pictures of naked molerats.<p>Clearly you need to be smart about crossing borders with electronic information these days, and not having any with you seems to be the best course of action.
评论 #24253291 未加载
评论 #24253669 未加载
评论 #24255026 未加载
评论 #24255370 未加载
est31将近 5 年前
&gt; Information is stored for 75 years although if it’s not related to any crime it may be deleted after 20 years.<p>I wonder if you have your house burned down and you want your digital pictures back, can you ask them to give you a copy of their backups? That&#x27;s the only thing that storing this data for this period of time is useful for, but I guess they won&#x27;t hand it over.
评论 #24254277 未加载
评论 #24255094 未加载
sumanthvepa将近 5 年前
I&#x27;m not a US citizen, and I used to travel to the US from India occasionally before the pandemic. In reality there is no data that I have with me on my laptop or mobile device, that isn&#x27;t already accessible to a nation state like the US. There is really no point trying to play games with US customs and immigration. You&#x27;ll just irritate them and it won&#x27;t end well.<p>The best strategy is to simply comply with all relevant US law and orders issued by officials at the border. And one should understand that at the border, a foreigner such as me will have very limited protections. In practice there are really no protections at all. People like me essentially rely on the goodwill of the US officials at the border.<p>For the most part they are polite and business-like. Its best to keep all interactions with them on a cordial basis and cooperate immediately and completely when ordered.
评论 #24253169 未加载
评论 #24253925 未加载
评论 #24253387 未加载
sixhobbits将近 5 年前
The interesting thing about this is that it affects people who have never been to the US and never intend to go, or those who do but take &#x27;precautions&#x27; to protect their privacy (secondary devices, double encryption etc) as most of the data in anyone&#x27;s inbox is not generated by them.<p>That&#x27;s pretty scary.
评论 #24255333 未加载
mlazos将近 5 年前
Hmm could you not just encrypt your data and leave the key at your house and throw one away before you reach the border. They can have all of the “data” that they want.
评论 #24253127 未加载
WarOnPrivacy将近 5 年前
What&#x27;s super awesome is nearly every US voter (including the ones reading this) will vote for the jackwads that enable and fund bulk surveillance abuses like this.<p>In and outside the US, non US citizens serve as a proving ground, for tech that US Gov will eventually deploy against it&#x27;s own citizens.<p>US Gov does this because it can, because news orgs are more interested in sportball, because both parties have successfully set citizens at each other throats for decades and because the public keeps gorging on whatever fear-filled plate of nonsense is put in front of us.<p>Ten years from now, an entirely new regime of surveillance abuses will be added to those already deployed against us. More than any other reason, this will happen because we endlessly reelect the people who are ultimately responsible.<p>We could do better.
评论 #24257405 未加载
swyx将近 5 年前
&gt; a federal judge in Boston ruled that forensic searches of cell phones require at least reasonable suspicion “that the devices contain contraband.”<p>outside of illegal porn, what exactly constitutes digital contraband? is this defined anywhere? any well known example cases?
评论 #24253347 未加载
评论 #24257409 未加载
dannyw将近 5 年前
I hope someone challenges this in court.
评论 #24252771 未加载
hamiltont将近 5 年前
Really wish I could enter a fake password on my Android device to launch a fake persona
评论 #24253091 未加载
评论 #24253449 未加载
评论 #24253788 未加载
RyJones将近 5 年前
If this is the case, I’ll leave the country with basically naked devices which I’ll restore on the other side of the checkpoint.
评论 #24252805 未加载
评论 #24253248 未加载
评论 #24252782 未加载
评论 #24252945 未加载
sys_64738将近 5 年前
Surely you&#x27;d need to be a person of interest to have them process your data. The data is likely encrypted so how do they decrypt it? They can socially engineer a way in but does that work? Do people break down and give up their passcode?<p>Would they really process the data just because? It seems like a severe amount of data to process and evaluate. How much compute power is set aside for this and how much online storage is used? Do they use a cloud service for this?<p>It&#x27;d be interesting to hear from somebody in the know about what is they real can do and what is heresy.
评论 #24253408 未加载
评论 #24253251 未加载
评论 #24253583 未加载
ff7c11将近 5 年前
So do I just need to fill my computer with porn? Or use stenography to put all my files inside porn.
评论 #24252863 未加载
评论 #24253401 未加载
评论 #24253255 未加载
pseudosavant将近 5 年前
Remind me to travel with terabytes of encrypted garbage data. Just to be a costly pain in the ass. I&#x27;d love to watch an incompetent CBP agent try to figure out how to move 10TB of disk images with USB thumbdrives.
评论 #24253622 未加载
评论 #24253645 未加载
arkanciscan将近 5 年前
My takeaway; they have to search for porn first because they can&#x27;t be amassing a huge porn collection, so store your sensitive info in your porn folder!
monkin将近 5 年前
At least now I can be like Jason Bourne, and have lockers in different parts of the world with laptops and phones... ;)
JumpCrisscross将近 5 年前
&gt; <i>Before uploading it to their network they check to make sure there’s no porn on it</i><p>What happens if there’s porn?
Yc4win将近 5 年前
I know they market this product for security researchers, and I&#x27;ve read all sorts of good reviews about the &quot;anonymous&quot; version. May everyone expand on this concept:<p><a href="https:&#x2F;&#x2F;usbkill.com" rel="nofollow">https:&#x2F;&#x2F;usbkill.com</a>
评论 #24259803 未加载
HenryKissinger将近 5 年前
Imagine the private letters of people in 1945 being of any use to a border agency in 2020.
评论 #24253750 未加载
评论 #24253003 未加载
icodestuff将近 5 年前
&gt; Before uploading it to their network they check to make sure there’s no porn on it (so they search your devices to find porn first).<p>&quot;Stenographically encode your important documents into your porn&quot; is what I&#x27;m reading here.
dvduval将近 5 年前
Uninstall everything before crossing the border? The 100 miles thing is the weirdest though, especially if enforceable on someone who has not recently&#x2F;ever crossed the border.
progfix将近 5 年前
Can&#x27;t they just ask the NSA for the Emails?
评论 #24253319 未加载
hansvm将近 5 年前
It sounds like a person needs a filesystem that generates a few exabytes of GPT-2 output on the fly.
supernova87a将近 5 年前
I guess the studios wanted to get their copyrights extended one way or the other.
WarOnPrivacy将近 5 年前
I hate the world in which my own Gov is the nation state I need to fear.
Havoc将近 5 年前
How long till burner devices are necessary for traveling to the US?
modzu将近 5 年前
defund the border patrol. seriously
hatenberg将近 5 年前
Cue the inevitable breach.
submeta将近 5 年前
When I was a kid in the 80s, I had a US flag on my wall. What happened to the US in the past fourty years? It became a country that I don&#x27;t really want to visit anymore. Every civilized nation behaves differently, at least towards citizens of allied nations. We are no enemies. Ain&#x27;t no reason to treat us non-US citizens like people without any rights. - I am deeply saddened to see the US come this way, and I have no hopes that this will change in the forseeable future.<p>Edit: Look at how non-US citizens exchange ideas for how to avoid handing over all their personal data at border-crossing. What a shame.
评论 #24253266 未加载
评论 #24253466 未加载
评论 #24253537 未加载
评论 #24254062 未加载
评论 #24253974 未加载
评论 #24253179 未加载
coleifer将近 5 年前
What are the use-cases, and when would such a policy have led to a drastically different outcome (in the case of a crime being committed, industrial espionage, or what-have-you)?<p>If I have a laptop encrypted with luks or whatever, then what? What are the consequences of non-compliance?
评论 #24257627 未加载
mlthoughts2018将近 5 年前
I wonder what implications this would have for business travel. Devices may be required to be encrypted and giving a business password may violate employment law in the home country for non US travelers. It could be illegal to grant US border agents access to the phone and also illegal not to.<p>Even if you could grant access, businesses may very rightly feel the content shouldn’t be accessed by US border agents and if it’s stored by border agents, it means now some US government server could fall under the juris diction of GDPR or something (eg my work phone or laptop had a photo with sensitive customer data or something).<p>On top of that, it’s increasingly mandatory to use your personal phone for business data, eg PagerDuty, Slack, company email, company social media tools. So while it may be your personal device, you may still run into crazy conflicting issues of whether you are allowed to unlock it.<p>How are you going to comply with “delete my account” requests when some business data is on US government servers for 75 years?<p>US agencies have deeply poor and incompetent information security, so how long before this is subject to a data breach, or a rogue employee exfiltrating and selling it? Will people be able to sue the US government for substantial per-person damages when that happens?<p>The conflicting and incompatible privacy issues of this are bananas. What an arrogant and deeply stupid thing to do by the border agency.
评论 #24253337 未加载
评论 #24254398 未加载