FlyerTalk Forums - View Single Post - Security Best Practices with Public Networks and Computers
Old Oct 6, 2016 | 10:23 am
  #14  
dsdwe234sfd23
 
Join Date: Sep 2016
Posts: 45
Computers and travel safety

The answers for using computers safely while traveling are:
  1. Always use a VPN! No exceptions. They are $32/yr or your can run your own at home. The VPN needs to support L2TP. PPTP is NOT secure.
  2. Never trust someone else's hardware. Use your own. For international travel, a $150 chromebook is sufficient and probably THE MOST SECURE computing platform available.
  3. Whole drive encrypt every portable computer/smartphone with a non-trivial decryption passphrase.
  4. Don't hibernate/standby computers when driving / moving through checkpoints. You want the encryption active, especially at those places.
  5. Do not use your normal email accounts when on travel. May be useful to change the passwords for the normal accounts and leave those at home. If you don't know the password, you cannot get in at an international checkpoint.
  6. Do not do any banking over a computer when traveling unless you are in jail and need bail money. Don't do trivial stuff- like paying bills. That is why ATM cards and toll-free phone numbers to banks exist.
  7. NEVER use any smartphone or tablet for any financial transactions. This is true at home too. As soon as you've loaded 1 extra "app" or game, system security is gone.
  8. Don't login to stores, banks, brokerage accounts with smartphones - browsing a store is fine, as a guest.
  9. Even at home, when you want to do financial transactions, use a LiveCD version of Linux that can be booted without touching the HDD. Never use the normal operating system you use for facebook, gaming, work, for financial stuff. Look at Brian Krebs site for more on this. Linked above.
  10. Phone-based 2FA is great if you travel where your phone/internet works. Don't trust SMS as a 2nd factor. It is not secure enough. Something like a yubikey can provide better 2FA for google and similar websites. Even for logging into your laptop, a yubikey can be used with "something you know" and "something you have" 2FA.
  11. If you are a sophisticated user, then you might setup a remote desktop using a full VPN or ssh tunnel and perform almost everything as you would normally from home. Using a protocol like NX (x2go) which includes efficient compression and full remote access to another system is handy when traveling. For normal productivity applications the performance is really very good. Know that VNC and RDP are NOT secure without a full VPN or ssh-tunnel.
  12. For VPNs and ssh, never use passwords. Always use key-based authentication. If using passwords, then you've already lost the security game.
  13. For VPNs and ssh, always use the IP address, not a DNS name. DNS can be altered by the network operator and on travel, that is more common than anyone knows.
  14. Leverage an off-line password manager which stores all passwords strongly encrypted.
  15. Use a different password for every account. The best password is the one you don't know and never need to know. I can't tell you my brokerage userid or password. Don't know either of those random groups of characters.
  16. Use a different userid for every account. Makes it harder when (not if) there is a breech. For example, yahoo (a very reputable online company) had a breech for 2 years before they told anyone.
  17. Use a different email address for financial accounts than you used daily for FB, twitter, work, ...
  18. Where passwords are required, make them very long (20+ characters), very random, never use words. Basically, there shouldn't be a need to remember more than 2-3 passwords. All the others are stored inside the password manager. If you use a password manager, authenticating a 50+ character, random, password isn't hard at all.
  19. Do not auto-fill website passwords. Authentication/logins should require positive action by you.
  20. Backup your data, programs, settings, daily (when at home), automatically, and keep enough versions to be able to restore any corrupt, lost, accidentally deleted files. Modern backup tools should be able to keep 60-120 days of backups for 1.1-1.3x the amount of storage needed for the original location. 100G of original storage should have daily backups for 60 days that need less than 120G of storage.
  21. Password managers don't just store passwords - put your CC info, insurance data, contacts, copies of immunizations, passports, government IDs, and any other important, scanned, paperwork like professional licenses, certificates, etc. Beware of commercial security tools. Often they have a different agenda than you.
  22. Prefer wired ethernet over wifi, but both can be hacked.
That is probably sufficient for most people to be reasonably secure during travel. Traveling with a 16G flash drive can solve most of these things - holding a backup Linux OS, contain your off-line password manager, and ensure a software key-logger isn't installed if you absolutely must use a another computer. Just boot from this flash drive.

Sorry this isn't short.
dsdwe234sfd23 is offline