Episode: 771 Title: HPR0771: Mischief Managed Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0771/hpr0771.mp3 Transcribed: 2025-10-08 02:09:07 --- . Hi, my name is Gordon Sinclair, I'm known on IRC as Thysolweb. Now, this HPR episode is about customs. It's about how to get your laptop, your netbook through customs with your data at the other side and effectively hidden from the copyright cops. Sorry, the customs officers who are these days basically working at the behest of the entertainment mafia and who have all sorts of rights and excuses to go rifling through your private data looking for downloaded MP3s and movies and stuff like that. So you've got different ways to do it. The last thing you want to do is to try to pretend that the laptop isn't working. I'll never buy that. What you've the idea is to cooperate and let them see what they think is everything when you know it's not. So you've got different ways to do it. I think of this as the security when you walk through the metal detector, your luggage goes through separately when it's actually adding stuff like that. And there's certain there's the security customs officer there and obviously the things like your keys will trigger the detector. You take them off and you go through again. So you've got to find a way to get your data from one side of this barrier to the other while keeping it hidden or keeping it away from the customs officers. So there's different ways to do this. You've got the first one is using some sort of cloud service whereby you upload your home folder to some cloud service. And then once you're through customs, you go through with a blank laptop or a blank netbook and you get your hotel at the other side, you connect then on it and you download it all from that server. And then they say the reverse on the way back as well. Before you're ready to return home, you connect to that server again, upload your home folder again, delete it and come through customs, download it when you're back home again. Now there's issues with that. If you're a business traveler, then that's less of a hassle because chances are it's going to be your company's server you connect to and it will be your, it will be secure, presumably it will be secure, the connection will be secure and the cost of uploading through wireless dongles or whatever, local connections, that's all going to be covered by your company. The issue here is for home users, for domestic users, when you take your machine on holiday with you, then you're looking at something, most likely it's going to be a third party cloud service like Amazon or Google or God help you, Microsoft, some server somewhere. But the problem with that is you're putting your own personal, excuse me, your own personal data onto a third party server. There's all sorts of privacy concerns with that. It will be mined for all sorts of information about you so that they can then target you with other services and you know, Google put, Google have algorithms to scan inside your Google Mail to pick out keywords and inject RVERS based on those keywords. It's not a human being but it is still an algorithm that's helping to build up a profile on you. So that's one concern is that it's, you're putting your private stuff in that cloud, a third party cloud, it's not entirely private. The second issue is with that is once you put it in the cloud, a lot of the cloud solutions are American based. So as soon as you put it there, the various departments of American government then decide, oh, that falls under our jurisdiction. It's a company on our soils, a server on our soils registered as a dot com. We have legal access to that and they don't even have to ask you if the third going for a fishing expedition, they want to find out what data they have on a user. They can just go to Amazon or they can go to Google or Microsoft or whoever the provider is and they'll roll over and sell you out essentially and you'll never know about it. So that's another concern. The other one, if you can get around that, I'm assuming you don't have anything that's really that troubling. If you can get around that, the other concern is about cost because if you're going on holiday, you don't want to be, you're not going to get a quote value for money on quote, ISP package when you're across in this in this country. If you're only there for two or three weeks, then you're going to buy a local ISP's Dungle, USB Dungle. If I go to America, I'm not going to, I'm not going to sign up to a two year contract with AT&T. I'm going to buy like a year of paying gold, USB Dungle. That's a throwaway thing that I'm only going to use it and maybe top it up if I have to and it's a throwaway thing. So when you're, if you have to download your home folder through this, this USB Dungle per megabyte, that's going to be expensive or it could be expensive. And then the same worth going for putting it back up the way before you come back home again. The other concern with that is if you're asked by a customer's officer to open your laptop and your network and switch it on and log in, which is the whole point of this episode is how you can do it without keeping your private stuff intact. So if you're going to be asked that anyway, then it looks suspicious. If you've got an empty laptop with nothing on it, it looks suspicious. And that's, these people are looking for any excuse to, to huckle you away at the side and call you a terrorist or whatever and use all sorts of powers to seize and do a do-hole forensics on your, on your machine. The whole point is you want to go through and let them see everything or at least what they think is everything. So going through with an empty laptop would raise suspicions. You'd at least be asked why. Now you could get away with it for a company. They say, look, this is a business laptop. It's company policy that we don't have any sensitive information on here that we be forced by all sorts of data protection laws to keep consumer data secret and all this. You can use all that for a corporate, but you're not going to get away with that as an individual holding maker. So that's the cloud. And what I mean by a cloud is basically a server somewhere. You could have your own FTP server or whatever. So it's just the idea of putting it up to some other server and back down has its issues. The other way to do it or an other way to do it would be to have a decoy user account. Now for this, it would mean that you would have to make sure your login manager does not show the user list so that when you're asked by a customs officer, could you switch your machine on and log in please? Certainly officer, not a problem. And you can log in with the fake username and the fake password. And for that, you would have to prepare it beforehand. Prepare the account beforehand to make it look like a regular lived in home rather than a show home. So for that, you could do a lot of things, excuse me. You could do a lot of things like going download a few podcasts, a few creative commons, audio books, create a few fake documents, word documents that are like, you know, let us do your local council or something to say or the trash hasn't been collected. I'm paying my taxes. What's all this? So do stuff like that. Prepare it in advance. Change the wallpaper. Have things open by default, like a media player owned by default. Have your web browser, bookmark some pages, some YouTube videos, some flicker pages, some blog posts, subscribe to a few RSS feeds. You get the idea, make it feel like a genuine home so that it looks authentic when you sign into it. Now, because if you've, you've always got the possibility of when you log in, there's a lot of RSS feeds that are marked as fresh. They've not been read yet. You might think that would look suspicious. I don't agree. Because you've always, especially with a netbook, you've always got the argument of, well, you know, and if there's updates as well to come, you can always say, well, look, I've actually got my regular laptop, when I'm at home, or my regular desktop, when I'm at home, my netbook only gets used to in a trouble. So it can be switched off for months and months at a time, and then just charged before a leaf home when I go on holiday. And that's just the condition it was in the last time I switched it on. I sometimes remember to switch it on every two or three weeks and do updates. Sometimes I don't. It's no biggie, really. So that's very, very plausible in that situation. So that's one, that's another way that the issue I see with that, though, is when you, when the whole point of this is to let the officers give the officers full cooperation, and the thing with that is you cannot rely on being the one that clicks around in different places. You've got to be able to stand back and let the officer go, wherever they want to go, if they want to click on something, they click on it. It's entirely possible that they would go in the file manager, they would click on up from the home folder, which leads you to seeing the home folders for every account on the install. So with that, it's just a double-clicking in another folder and they're into your private stuff that you're trying to sneak past them. So that defeats the purpose. That's the flaw in that plan. The way there's another way to do it as well. And that is to have a decoy distribution. Now, if you go traveling quite a lot, it would be worth actually setting your laptop up and your net boot up like this with a decoy distribution. And for that, I would say don't go with a known distribution or a KDE distribution, not because they're bad, but because features in Nautilus and I believe Dolphin as well, would actually count against you here. When I don't use Dolphin very much, so as far as I remember, this happens in Dolphin as well. Nautilus, it picks up partitions that are on your disk and it helpsfully mounts them and puts them on the sidebar, which is great. It's really handy, but in this case, you don't want that because the officer is just a click away from your home folder, your real home folder, which is the whole point of trying to hide that. So I would suggest going for something that's light, that doesn't use Nautilus or doesn't use Dolphin. Thunar is a good bit, so something like that XFCE or even CrunchBank uses Thunar as well. So if you set it up to dual boot and put your your main distribution as you would normally install it, believe say a 10 gig partition at the end of the drive for your decoy partition and install whatever that happens to be, it might be CrunchBank, it might be something else. And put that on the remaining 10 gig. And again, the same thing happens, the same thing applies, make sure that you prepare it in advance, change the wallpaper, set up bookmarks, RSS feeds, some decoy documents, make it look like a genuine home. And then when you're asked to boot up the laptop, well you've got something to go into that's not going to see and not going to mount your normal stuff. So the problem, the next thing is here, well, if you're dual booting, then surely the, you would get the grab menu in the office or would see that and see that there's two operating systems and would want to see both. Well, here's the trick, if you install, make sure grab is controlled from the decoy operating system. When you are about to go on holiday, when you're about to travel and you know that you might get built out of line and being asked to switch the machine on, what you do it basically is log in to the decoy operating system, the decoy distribution, you know what, you could even do your updates and better before you, where we are there. But open up grub and change a couple of things in the grub file. So it would be pseudo space, G-Edit space, slash boot, slash grub, slash grub.cfg, that will open it as root obviously and needs to be root with G-Edit and use your editor of choice. And the two things you're looking to change here, first of all is the set default equals zero. That means that it's, it's always the one that's right at the top of the list that ensures that when you get a new kernel, it boots into that because that appears at the top of the list. Now, if you count down the number to the one that's the actual decoy and set that as your default, obviously it starts at zero. So if your decoy is fourth on the list, then that would be set default equals three, zero, one, two, three. So you might need a bit of trial and error to get the correct default as your decoy one is a default. So I would set that first and then reboot, don't touch it, I'll let the timer count down and see where it goes. Once you've got the right distribution or the right one, then go back into grub again and change the next thing you're looking for is the timer. So it's set timer equals five or ten or whatever that's in seconds. So change that to zero. And if you do this, since you do that, you don't see grub. The next time you reboot, you don't see grub, it goes straight in your default, as if that's the only thing on the disk. So that's basically it. When you walk through customs and you're pulled out a line, could you power your laptop off, please? Certainly, officer, not a problem. And you power it up, your grub doesn't show it goes straight in the decoy. You sign in, as you'd expect to sign in and happily stand to the side and let the officer click away to their hearts content. You are in the model of a cooperative citizen known fine well, that your data is actually on the machine they are touching, but they'll never see it. It is basically invisible ink. The other way to look at it, I'm not the under the whole wall analogy, is it is the tunnel underneath. Excuse me, it is the great escape. As your data travels underneath their feet, and they are completely oblivious to it. So that's that's how we do that. The other way you can do with grub is have it to automatically reboot into the last used, the last used install. I wouldn't trust that because just in the off chance that you forget which one was the last one and you end up booting into the real partition you're left with no choice, but they'll log in and give away all your data. So I wouldn't do that. I would certainly set a fixed default and do that. So that's it. If you are regularly going through customs, you can get your stuff assuming you can keep a straight face known that the officers are completely oblivious. You can get your private stuff through customs right under their noses and they'll be done the wiser. Obviously it's not going to do anything for forensic searches, but the whole point is you are the model of cooperation, so they have no reason to suspect there's anything up. That's the whole point. The other side to this would be encrypting your normal data, but that's I'm going to do separate screencasts about that. The whole point is just to keep it away from the search at customs. So that's it for this episode and if you have a need for that, then I hope it's helped you and if you do so and get caught, ain't nothing to do with me. As usual, it's the whole lyrics thing. Use it your own risk. So thanks for listening. I'm Gordon Sinclair. I'm on the IRC as Thistleweb. You can contact me if you like. That's Gordon at Thistleweb.co.uk. I'm going to tell the next episode. Goodbye. .