Главная
Study mode:
on
1
Introduction
2
Do I Have To
3
Threat Model
4
Examples
5
What To Consider
6
Your Threat Model
7
Decision Time
8
Threat Models
9
Rights At The Border
10
All Devices Must Be Fully Charged
11
Can I Bring A Burner Phone
12
Burner Phones
13
If the agent is savvy
14
Best practices
15
Look at the warrant
16
Stay silent
17
Fifth Amendment privilege
18
Questions
19
Data Retention
Description:
Learn how to protect your digital privacy rights when law enforcement requests access to your passwords in this informative conference talk from BSidesLV 2017. Explore various threat models, understand your rights at border crossings, and discover best practices for handling encounters with authorities. Gain insights into the Fifth Amendment privilege, data retention policies, and practical strategies for safeguarding your personal information. Examine real-world examples and consider important factors when deciding how to respond to law enforcement requests. Equip yourself with knowledge on using burner phones, interpreting warrants, and exercising your right to remain silent in potentially challenging situations.

How to Respond to Cops Who Want Your Passwords

BSidesLV
Add to list