For the last two years I've carried a honeypot laptop with me every time I traveled. I checked it in my luggage, left it unattended in my hotel rooms. After each trip, I did forensic analysis on the laptop to detect if it had been tampered with.
I wrote about my experience and methodology here: https://theintercept.com/2018/04/28/computer-malware-tampering/
@micahflee That's awesome!
@micahflee The simple reality is that most people who think they're a target simply aren't.
@micahflee love those stickers :-)
@micahflee well you did have the EFF "I do not consent to the search of this device" sticker on it so I guess that spooked them ;)
@tomas that's a strange rule, any idea why is it so? Would they hurt themselves with the gun
@qbi @jotbe @micahflee here is an article by the lawyer of german publisher heise about "haven": https://www.heise.de/ct/artikel/Snowden-App-Haven-Einsatz-kaum-mit-deutschem-Recht-vereinbar-3948210.html (de) - concluding that it will likely be illegal to covertly record voice audio of someone, privacy laws set high bars and in general prohibit video surveillance in non-public places without any visible notification that this happens. not sure whether it would be ok with a visible sign denoting "video surveillance in progress".
@micahflee my infosec strategy: use a computer so idiosyncratic and jury-rigged that replacing parts, modifying the bootloader, etc., will probably result in the computer not working any more
@nev sounds like a solid, reliable strategy
Server run by the main developers of the project It is not focused on any particular niche interest - everyone is welcome as long as you follow our code of conduct!