Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn how to protect your digital privacy rights when law enforcement requests access to your passwords in this informative conference talk from BSidesLV 2017. Explore various threat models, understand your rights at border crossings, and discover best practices for handling encounters with authorities. Gain insights into the Fifth Amendment privilege, data retention policies, and practical strategies for safeguarding your personal information. Examine real-world examples and consider important factors when deciding how to respond to law enforcement requests. Equip yourself with knowledge on using burner phones, interpreting warrants, and exercising your right to remain silent in potentially challenging situations.
Syllabus
Introduction
Do I Have To
Threat Model
Examples
What To Consider
Your Threat Model
Decision Time
Threat Models
Rights At The Border
All Devices Must Be Fully Charged
Can I Bring A Burner Phone
Burner Phones
If the agent is savvy
Best practices
Look at the warrant
Stay silent
Fifth Amendment privilege
Questions
Data Retention
Taught by
BSidesLV