Just have multi-boot and before crossing set the auto-boot timeout at 0, then change it later.
If you want to be safe, you can also copy and delete the boot details for your actual partition.
I leave a dummy partition with Windows, office and other shortcuts and a wallpaper of a cat during my US visits.
I also have both a facebook and a gmail subscribed to all the spam you can get.
Not because I have any criminal activities but my customers deserve to have their information protected.
If authorities want to check my private and work data, they can ask nicely through a judge.
>> If authorities want to check my private and work data, they can ask nicely through a judge.
I am confused,surely non-citizens have no rights or recourse to the law at an airport?
In any case, I am concerned that your approach would be defeated if they took an image of your hard drive and threw some basic tools at it. They probably have this as a kit.
Non-citizens effectively have zero rights. Your rights increase as you go through different visa types and get to citizens. The appearance of actions like these can make you appear deceptive, or uncooperative at the very least. CBP can easily put you on a plane back after making things uncomfortable for a while.
> I suppose disconnecting the SATA-cable would make the hdd/sdd invisible to the system...
On a laptop? All laptops I've seen have the hard disk plugged directly into the motherboard, with no cables in between. Having a SATA cable is more of a desktop thing.
Weird, I do have exactly the opposite experience, incl. a bay for a second SDD (on a gaming laptop/workstation one). Ability to replace an old HDD with SDD on a 6y old laptop... and then replace the optical drive with another HDD (just for the storage)
Perhaps nowadays it's the norm to have it all soldered in but I'd just not buy such.
I think a minority of laptops have soldered-on HDs. More have them hard-attached now than a few years ago (when almost none did), and many recent laptops have "mSATA" connections, which is more like a RAM connection than a cable. You could achieve the same thing with an mSATA connection as you would with unplugging a cable by removing the mSATA drive/card, and applying a thin strip of something non-conductive over the pins, and plugging it back in. Just please don't use something adhesive; the residue after a few applications/removals can screw up connectivity when you want it to work.
That said, I'd imagine there's an economies-of-scale advantage to having soldered-on drives (to say nothing of the economic benefits of un-upgradability: sorry folks, but there aren't enough people to whom part-swap upgrades are important to sway the hardware industry at large on this issue, though a few small manufacturers/lines will probably target that market). As a result, I'd imagine that we'll see more and more of them in years to come, though I'd be happy to be wrong about that.
'course, I don't recommend bringing your data into a country you consider hostile regardless of whether you've set it up so a cursory search doesn't find it. If the country really is hostile to your interests, that won't stop them if they want your info.
On much older MacBooks that is true. MacBooks since around 2015 have had mSATA "RAM-style" connectors, and I've heard that some more recent models have soldered-on drives, though I haven't seen this myself.
Let's not forget that criminals can also exploit a backdoor, so creating them jeopardizes public safety.
Furthermore, if IT vendors agreed to create those backdoors, criminals are not forced to use those products and can still rely on homebrew or foreign tools.
Later, the situation might escalate where these tools utilization is prohibited (e.g. VPN, Tor), as we see in some countries, but that shouldn't stop criminals from using them while making the public vulnerable.
And the authorities are equally likely to commit a crime as the man on the street, a fact they generally don't acknowledge and certainly don't design their own systems for.
You cannot create safety by concentrating power and authority, you create it by limiting the effects of those two.
A critical security issue in public cloud is that users often misunderstand what infrastructure security entails.
I've been in public cloud pitches that sold their security measures as a golden standard that made my managers believe there's no need for a security team anymore.
No need for protocols or proper architecture as x cloud has enough flashy certifications.
This is also a slippery slope for US cities and states:
- We invest money we don't have in an infrastructure we don't need hoping it will bring tax payers and investment so we can pay it in the future.
This is mostly caused because of the 5 years out vision: I need to build stuff to get re-elected.
About retreating behaviour, this was slightly the case with Mount&Blade Warband, where units would now and then flee when their moral was low, which could happen due several factors.
Still I am unsure if historically anyone would be willing to charge alone against 100s of heavy cavalry units for a guy that pays ok.
Depending on the era, typically it was a full retreat and slaughter as soon as the shield wall broke. Not all the time, but that was just typically how it went.
Charging cavalry would be stupid. Soldiers knew no horse would challenge a bristling shield wall.
It currently depends on the player or game source:
- Deathwing, a multiplayer cooperative game based in the WH40K universe have an AI problem, which makes the game utterly boring as enemies will do exactly the same each time.
- AI bots have the additional value to fill less played games, expanding their lifetime value.
- Finally, I can't dedicate 100+ hours to become good in a multiplayer game, so I'll rather smooth the experience combining human players and AI bots.
Mac Pros were hugely disappointing for professionals:
- The big boxes were highly upgradeable, which is what a professional needs.
- The trashcans are a nice concept but traded the main perk of Mac Pros for design.