Travelling to the USA next week. I'm a JAVA programmer that develops enterprise software for the company I work for...

Travelling to the USA next week. I'm a JAVA programmer that develops enterprise software for the company I work for. I need to make sure that if I get checked at customs that they can't copy the source code on my laptop. I am sure there is a protocol like "if netbeans is on device copy whole harddisk".

Is VeraCrypt reliable? Everything I've read online says the government can't get around it.

They'll likely question why you have encrypted files and then ask you to decrypt them
Your only hope is deleting everything and then redownloading it once you get to your destination

I can't redownload it simply because of the archive size and practically it sucks. I am also not willing to put the source code online in anyway, not on the darknet and not encrypted.

I realise I will be forced to fly home when I refuse to drcrypt the laptop, that is a risk I am willing to take.

The company you work for's policy should be:

Never take company laptops across borders. Never take company data across borders.

They have the absolute right to deny you entry for any reason, or no reason. They are particularly keen to use that right at the moment.

This is a use-case that Chromebooks are especially good for, but even with that you may need to stow it in the cabin not the carry-on.

Veracrypt has a "hidden container" feature especially for this.
So encrypt all, OS included, and put sensible files in the hidden volume. If asked, decrypt only OS and basic files. Make sure to have non-important JAVA files on the non-hidden part.

I'm no immigration lawyer but my understanding is if you are forced to fly home in that way - i.e. you are deported - they will deny you entry to the US for many, many years, effectively almost forever.

If you are willing to put it in their hands encrypted, you are willing to put it on the network encrypted, and the archive size is not significant until it crosses a petabyte, stop moaning.

If that's a problem for you, either remote-work or pull your operations out of the US: that's the only way they'll learn.

this

I'm not OP, but I feel like this is probably a good thread to ask this in.
Is TrueCrypt still safe, or should I be switching to VeraCrypt? Do we even know?

>practically it suck
You claim to have some super secret software yet you're incapable of uploading the data and downloading it later
I think you're just some dumb kid or some nobody who thinks he's a snowflake

Just switch to VeraCrypt, TrueCrypt isn't maintained anymore

> Put it on a USB stick
> Delete it from your computer
It's that simple

>HDD is 500GB
>OS takes up 380GB total
"sir what are you hiding?"

encrypt the files and put them on your phones sd card
name it something like /.android_arm

Looking into this, cheers.

Not being able to enter the US would be annoying for work, but definetly not the end of the world. Using RDP is another option but since I am planning on scanning code for hours with American programmers that could get very annoying.

Encrypting it and putting in somewhere darknet is an option I suppose, but I prefer not having to download 500 gb.

O damn, you totally got me.

Why don't you ask your company what to do? Just follow company policies and even if customs end up copying your code you can just tell your boss you did exactly what your company dictated and it's not your problem.

>if netbeans is on your computer
quit your job

this
OP is some dumb kid who thinks he's a hacker or some shit

So if you're scanning code for hours you don't have much code to check so it can't be that much data
Just encrypt and call it stuff.bmp
mong

Are they looking into personal computers at this level of detail? Where is the free world you talked about, burgers?
What if I had trap porn, would I be forced to log in and let a fucking fat cop look into my folders?

We're a small company developing highly specialized software. I'm the lead programmer working with three other programmers and the owner. We don't have IT personel.

I'm the only person with a bachelor in IT so I need to do this myself.

Just to be clear, I know what to do.. my only question was.. is VeraCrypt reliable?

Hey cunts, I am not asking what to do. I am asking you if VeraCrypt is safe. I literally do not give a fuck about all your secret spy ways to get data across the border.

Not really, but there is a chance they'll ask you to unlock all your devices. I'm fine with leaving my phone at home for privacy reasons but I definetly need my laptop.

I'll be dammed if they see my rare pepes.

I don't know about VC, but TC worked well (the version before the cuckening).
Just create a file based volume and hide it somewhere in the file system. For extra protection you can create the volume with plausible deniability (a hidden volume inside the main volume with a fixed number of fake files that decrypts with a different password than the main volume)

POO

Burger here. Will I face OP's issue if I'm only flying state to state? One of my laptops is encrypted and I won't be carrying it with me but it's still going to be in the luggage thats flown over to the destination.

Use full disk encrytion with LUKS and if they ask refuse to give any password.

Hell you might as well install temple OS.

No. TrueCrypt, and therefore likely VeraCrypt, has a feature to hide the encrypted data as noise in the free space. Could do that. Vanilla Windows install with a hidden blob.

>I need to make sure that if I get checked at customs that they can't copy the source code on my laptop.
Yeah don't bring secret stuff into USA physically if you aren't a courier travelling carrying encrypted data with a diplomatic passport. I don't see how the fuck your code could be too big to download. If it actually was your company would have guidelines for this shit.

Anyway if your company doesn't encrypt laptops by default then they don't care about security. I wouldn't worry about anything.

>Encrypting it and putting in somewhere darknet is an option I suppose, but I prefer not having to download 500 gb.
Ever heard of accessing company servers through VPN? Are everyone in your company this retarded?

I don't think USA can prevent an American citizen from entering their own country. Technically you aren't leaving your own country. They can probably harass you either way though. Don't bring stuff with you you can't show your mom or the government.

No government gives a shit about your half assed project,Use Veracrypt and close your eyes while you mash out a password because your project wasn't worth revisiting anyways...

>We don't have IT personel.
Well the owner obviously cheaped out on IT infrastructure and personell then. Tell him that you can buy hours from a consultant to help you out with this kind of shit.

It's a pretty permanent move so I have no choice to bring the laptop. Its going to be part of the luggage which i won't be personally carrying on the plane. Do you think I'll be alright?

Someone forward this thread to FBI. This guy is up to no good. I don't want him bringing illegal shit to our country.

Encrypt sensitive shit in a container, upload to amazon glacier, wipe your laptop, move, redownload from amazon glacier. Never carry anything sensitive with you where they might check your stuff.

It all comes down to what you don't want the gubbermint to see. Is it worth risking jail time for pirated content or whatever? Is it worth risking jail time for not giving up encryption keys?

If the time comes and I have to give the encryption key, I will. I just want to confirm if I will have to or not. I don't have anything to hide. It's encrypted as decoration. But there are still some things I might do to prepare if for sure I'll get confronted and forced to give away my pw.

>glacier
This may not be the best choice due to retrieval fees, but the general advice is solid.

It must suck not being able to say "get a warrant, asshole" and walk off.

Why not keep laptop at home and install VNC and use encrypted connection over a VPN?

Yeah it can be costly if you need to store a lot. Google drive would probably be a lower cost solution. S3 might be a better choice for a short term backup.

this. he probably wants to encrypt a bomb to sneak it in

>VeraCrypt
What are you hiding, faggot? Are you terrorist or pedophile?

Put your source code in a password protected RAR, inside another password protected RAR, repeat many times. Delete the program you programmed to do this. Store the passwords in paper in your pocket. Once outside the airport, put the passwords in order and you have your source code. They wont bother cracking N times a RAR file just to check. If you are not carrying anything out of place.

Why you think you are going to be retained and all your electronic devices thoroughly checked?

>Why you think you are going to be retained and all your electronic devices thoroughly checked?
Because he thinks they go through the files, not install backdoors.

What is the point of installing a backdoor if he is already running an OS with one?

Yeah it is, rest assured.
Unless you're Edward Snowden, then they will put more effort and money.

>web terrorist
>uses Java

Gets advice, gets mad.

Well, fuck you.

It's safe, but a 500gb encrypted container will draw attention. No one will believe it's code, either.

It's not, faggot. Go freeze a turd and fuck yourself in the ass with it.

can microSD cards be thrown amidst your clothes and not raise suspicion?
pic unrelated, just the microsd cards loosen in the bottom of the luggage.

or on shoes, doorway metal detectors cant detect them, can they?

>encrypted data as noise in the free space
wtf are you talking about?
hidden volume? as is the Protected free space on the outer volume?

or freespace on a nonsystem partition? it then stores the clusters info somewhere else for the volume to be loaded?
like a controlled delete and undelete?

btw OP, whats the issue with uploading, security wise, if its encryppted its encrypted, throw it in a couple 32GB microsd and put them on your shoes sole,

The point of uploading is you're not carrying the data across the border so they can't compel you to decrypt or detain you for refusing.

huh?
i meant to ask OP why he's scared of uploading encrypted files.
carrying microsd was a separate suggestion

Ah, the ol' Alaskan Pipeline.

Veracrypt is reliable enough if you're not being targeted.
But if you want security you should switch to a more secure operating system entirely and rely on FOSS encryption provided on that platform.

>Just to be clear, I know what to do..
Then why are you here?

If you knew what to do you'd put all sensitive data in a tar ball. Then you'd use one of the many open source encryption programs out there to encrypt your sensitive data. Then you'd upload it to literally any place that allows you to upload files. Then you'd cross the border and download the file. Then you'd decrypt it.

Instead you're entering in to a situation where you can actually be compelled to give your key, crossing your fingers, and repeating the magic word steganography.

>I can't redownload it simply because of the archive size

You have a TB of source code? Holy shit, Pajeet, you've been shitting up more than the designated street.

TC passed it's audit and its devs got vanned so signs point to secure

he is programming his game, yandere simulacrumb

>JAVA
>traveling to the US
Pajeet?

Veracrypt and upload to some cloudhosting. Redownload when you're at your destination.

I don't know about you but if I saw someone that tried to hide SD cards while passing the border I would detain you and do a through investigation. The idea is to not look and act like a criminal when passing through security checks to minimize the risk of having an arm jammed up your ass for rectal examination.

> encrypt disk
> ship laptop to destination
> take plane to destination
> decrypt disk

Just don't give the TSA anything to fuck you with.

I rather eat laxatives than getting fistfckd

I would just upload it onto a large micro SD, encrypt, cover the terminals with paper and insert into a phone. If your shitty little java game is that important to your company I'm sure they have something like that sitting around.

>I don't understand how hidden containers work in VC but im going to act like I do on an anonymous imageboard

entropy analysis will find the partition though

You're gonna get busted and you'll be denied entry for the next 50 years.

No one would do it normally.