Curious if this also applies to Laptops ? This quote does not mention the scope of the ruling, but to me, the article leaves come confusion to my question:
>The Supreme Court has not yet considered the application of the border search exception to smartphones, laptops, and other electronic devices
"The Supreme Court has not yet considered" simply means that the court hasn't said anything either way. It isn't meant to imply anything about what position they might take if they considered it.
i act as a bit of a paranoid nutter and actually shut off my laptop when flying international. it's pretty much the only time i do that. the question is not answered to my satisfaction, so that's the choice i make in response.
What does shutting it off do? As far as I understand, they can still require a search. I had it happen once when entering Canada, they said if I didn't consent to the search they would confiscate my laptop. I let them search it, and obviously they didn't find anything incriminating, but it felt so violating watching them go through all my personal photos.
No. They did it in front of me and all they did was run a search for JPG and PNG images. Then they went through all of the pictures. They did not attach any hardware/cables to the computer and they did not connect it to a network.
That said, this was years ago. I have heard that they do try to clone the drive now.
with this concept of testing for actual electronic equipment vs nefarious object disguised as an electronic device my protections of shutdown still hold
Turning it on without logging in does not decrypt the FDE volume though. I'm only turning it off to ensure the decryption keys are not in memory. There's nothing on my laptop that would land me in trouble, but they're going to need a $5 wrench to get access. The day that happens, we'll know if it will need to be used, or if the mere presence of the wrench is enough
My approach is to replace the SecureBoot keys with one of my own signing, and sign my own bootloader. Have it boot into Windows unless a specific key combo is pressed, otherwise have it boot into Linux and require a password to decrypt the drive.
Plausible deniability and FDE (for the partition you care about at least).
Only time I was ever asked to login was in Morocco. It was an older agent and I assume he just wanted to make sure it wasn't a fake screen or something.
That’s why I use plausible deniability utilizing some software similar to veracrypt. If forced, you can enter the password for the fake OS, login and nothing in there except some sunsets pics.
>The Supreme Court has not yet considered the application of the border search exception to smartphones, laptops, and other electronic devices