Star 0

Abstract

Business travelers may cross international borders many times per year. Several countries overtly or covertly apply digital forensics to the devices of visitors, either extracting data or compromising integrity. Yet, a traveler often needs some computing capability, and can't leave everything at home. We describe hardware, software and services to mitigate these threats.