How to lock down your phone if you're traveling to the U.S.
Border search powers and constitutional limits
- Multiple comments note that at the U.S. border Fourth Amendment protections are heavily weakened; CBP claims broad authority to search devices without a warrant.
- ACLU guidance is cited: citizens can’t be denied entry for refusing to unlock, but can face delays and device seizure; non‑citizens can simply be refused entry.
- There’s confusion and debate about whether Fifth Amendment (self‑incrimination) protects passcodes; consensus in the thread is that asserting rights can still lead to a very bad experience in practice.
- Data from “advanced searches” may be stored in CBP databases for 15 years and searchable without a warrant, which many find especially troubling.
Locking, wiping, and burner strategies
- Several argue “locking down” (refusing passwords on a normal phone) is the worst option: you have little leverage, and it invites detention, interrogation, or seizure.
- Popular advice: travel with a wiped phone and restore from backup after crossing, ideally seeded with some benign activity so it doesn’t look freshly erased.
- Others warn agents could demand you restore from known cloud backups, or may infer their existence from major providers.
- Many recommend burner devices (cheap phone / laptop, or older “n‑1” phone) with minimal, non‑sensitive data. Some companies already issue dedicated hardware for travel to the U.S. and a few other countries.
- A minority say they’d rather have devices seized than unlock them, on principle.
Technical obstacles: backups and device design
- Several travelers are afraid of imperfect restores: TOTP, banking apps, secure‑enclave keys, WhatsApp/Signal states, national e‑ID apps, and obscure/proprietary apps may not survive a wipe.
- People lament that iOS and Android don’t support reliable, user‑controlled full‑image backups; rooting/custom ROMs can help but increase other risks (e.g., forensic tools).
- Suggestions include: test backups on a second device; keep critical secrets off phones; treat the phone as disposable.
Duress, “honeypot” setups, and device features
- Interest in duress or “honeypot” passcodes that unlock a limited, innocuous profile. GrapheneOS’s duress feature and Android multi‑user/work profiles are mentioned; TrueCrypt/Veracrypt hidden OS is discussed for laptops.
- Others point out: if agents know these features exist, they may suspect hidden data anyway. Any device that leaves your sight is considered compromised by more paranoid commenters.
Travel choices and broader reactions
- Many non‑Americans say they now avoid U.S. travel altogether, comparing current practice to authoritarian states or 1980s Soviet travel guides. Some countries reportedly issue U.S. travel warnings.
- Others counter that many countries (including Canada, UK, parts of EU, Gulf states) have similar or harsher border powers; the U.S. is not uniquely bad, though still objectionable.
- There’s extensive unease about political‑speech–based visa revocations and device searches, and concern that “just don’t bring incriminating data” effectively chills normal political expression.