Airline travellers are now requested to submit their phone to security controls before getting on board; more and more frequently, specially in the United States, they are even requested to unlock it, and/or to reveal their passwords.
To be prepared for this, here are some preventive measures you can take before check-in, to make police & customs controls as smooth as possible, even if your phone contains privacy tools and classified stuff .
Before police & customs formalities:
- Move your ownkeepass database to
- Replace it with a fake database with some credentials for non-sensitive matters
- Back up folder
"/root/.gnupg/" (your GnuPG keyrings) to
j, empty it and fill it with inoffensive fake data (see here)
- Back up/hide all
- Create alternative candid accounts for email and social networks, hide any evidence of your real accounts
- Disable developer mode and Android support
- In case you wrote down this note somewhere in your phone, erase it!
- Pick a “dumb” device (i.e. unable to mount and read encrypted volumes) having a micro-sd slot (e.g. camera, audio player…)
- Swap phone and dumb device micro-sd cards
- Smile at security officers, enjoy your flight. You are innocent.
Of course, this doesn’t make you 100% safe if you want to travel with ultra confidential data (the only way to do so is to keep it far away from any official of non-official lurkers). However, you’ll have a reasonable probability to appear as someone who has nothing to hide.
 These suggested actions are intended for Jolla/SailfishOS phones; you may of course adapt them to your device.
 Assuming you have an encrypted “j” volume (e.g. Truecrypt, Veracrypt, LUKS) in your micro-sd card and/or in the cloud (with a strong pass phrase of course). If not, see here.