You Should Make A Digital Bugout Bag
Summary
TLDRThis video script emphasizes the importance of a digital bug out bag, an emergency survival kit with encrypted digital backups of essential documents on a microSD card using VeraCrypt. It guides viewers on how to create secure backups, protect them from theft and physical damage, and includes tips on essential apps for offline navigation, weather forecasts, and survival information. The tutorial aims to prepare individuals for crises where digital security and access to crucial information are vital.
Takeaways
- 🆘 The International Red Cross recommends having an emergency survival kit with multi-day supplies for natural or man-made crises.
- 📱 A 'digital bug out bag' should include personal documents, a cell phone with chargers and batteries, and emergency contact information.
- 🔒 Digital documents should be securely backed up and encrypted to prevent loss, theft, and misuse in a crisis.
- 💼 A microSD card is suggested as a compact and versatile storage medium for the digital bug out bag.
- 🛡️ VeraCrypt is recommended as a cross-platform encryption software to secure files on the digital backup.
- 🔑 A strong passphrase of at least 30 characters is crucial for encrypting the digital backup to ensure it remains uncrackable.
- 📚 Important documents to include in the backup are medication lists, medical information, proof of address, legal documents, and insurance policies.
- 🔐 Use a password manager like KeePassXC to securely store and backup all login details and two-factor authentication tokens.
- 🔄 Create a backup of the backup to ensure redundancy and security of the digital bug out bag.
- 🌳 Download offline apps for emergency situations, such as navigation, weather forecasts, survival guides, and plant identification tools.
- 🚫 Consider operational security by hiding the digital backup in inconspicuous items to avoid drawing attention in a crisis.
Q & A
What is the purpose of an emergency survival kit according to the International Red Cross?
-The purpose of an emergency survival kit is to provide multi-day supplies of essential items for use in case of natural or man-made crises that result in the need for evacuation or a major disruption of daily services.
What is a digital bug out bag and why is it important?
-A digital bug out bag is a collection of digital essentials, including copies of personal documents, a cell phone with chargers and extra batteries, and emergency contact information. It is important because it provides an additional layer of security and accessibility for essential documents in case physical copies are lost or destroyed during an emergency.
Why should digital documents be encrypted?
-Digital documents should be encrypted to protect them from being easily abused for fraud in case they are stolen or lost. Encryption ensures that even if the digital documents are accessed by unauthorized individuals, they cannot read the contents without the decryption key.
What are the advantages of using a microSD card for a digital backup?
-A microSD card is advantageous for a digital backup because it is small, easily transportable, and can be securely encrypted. Its small size allows it to be hidden in various items, and it is more resilient against physical elements like water and fire compared to paper documents.
Why is VeraCrypt a suitable choice for encrypting a digital backup?
-VeraCrypt is a suitable choice because it is a cross-platform, free, and open-source encryption application that works on Windows, Mac, and Linux. It can create encrypted files, partitions, and even entire operating systems, offering strong security measures such as hidden volumes for plausible deniability.
What is the significance of using a passphrase for encrypting a digital backup?
-A passphrase is significant because it provides a layer of security to the encrypted volume. A strong passphrase should be at least 30 characters long and memorable to ensure that the encrypted data remains secure and cannot be easily guessed or cracked.
What are some important documents to include in a secure digital backup?
-Important documents to include in a secure digital backup are medication lists, medical information, proof of address, deeds or leases, passports, birth certificates, insurance policies, and any personal photos or files one wishes to keep.
Why is it recommended to have a backup of your digital backup?
-Having a backup of your digital backup ensures that even if the original backup is lost, damaged, or compromised, there is another secure copy available. This redundancy is crucial for maintaining the integrity and accessibility of important data in an emergency.
What are some items that should be included in an emergency digital bug out bag besides the encrypted backup?
-Besides the encrypted backup, an emergency digital bug out bag should include a waterproof or fireproof Faraday bag, a dumb phone with multiple SIM cards, extra chargers, batteries, cables, a power bank, and backup 2FA tokens. It may also contain offline apps for navigation, weather forecasting, and survival guides.
What is the role of a Faraday bag in an emergency digital bug out bag?
-A Faraday bag in an emergency digital bug out bag serves to protect electronic devices from electromagnetic pulses or interference, ensuring that they remain functional during an emergency. It can also be waterproof, adding an extra layer of protection against the elements.
What are some recommended apps for an emergency situation that can be used offline?
-Recommended offline apps for an emergency situation include OSMn for privacy-respecting map and navigation, TrailSims for off-track navigation, offline weather forecasts, and survival guides such as Offline Wikipedia for a wealth of information and apps for recognizing wild edibles and herbs for foraging.
Outlines
🛡️ Emergency Preparedness with a Digital Bug Out Bag
The International Red Cross advises having an emergency survival kit equipped with multi-day essentials for natural or man-made crises. This includes a digital bug out bag with personal documents, a charged cell phone, and emergency contacts. Paper documents are vulnerable to damage or theft, and may not be secure against fraud. A secure digital backup on a microSD card, encrypted with VeraCrypt, provides an additional layer of security. The card can be small and hidden, protected against various elements, and easily transportable. The tutorial covers creating an encrypted backup, securely copying files, and protecting them from theft and physical damage. It also discusses the advantages of digital copies, such as encryption and resilience against environmental factors.
🔒 Secure Digital Backup and Encryption with VeraCrypt
The paragraph explains the process of encrypting a digital backup using VeraCrypt, a cross-platform, open-source encryption application. It highlights the benefits of using multiple encryption algorithms for enhanced security and the option of creating a hidden volume for plausible deniability. The importance of choosing a strong passphrase is emphasized, and the setup process for VeraCrypt is detailed, including the creation of an encrypted volume and the secure transfer of important documents. The paragraph also suggests backing up the encrypted volume and protecting the physical security of the backup. Additional items for the digital bug out bag, such as a waterproof Faraday bag and essential emergency apps, are recommended for comprehensive preparedness.
📲 Enhancing Emergency Preparedness with Essential Apps
This paragraph focuses on the importance of having offline apps for emergency situations on your smartphone. It recommends OSMn, a privacy-respecting map and navigation app, and suggests downloading offline maps for areas you may need to navigate. Other apps mentioned include Trailsims for off-track navigation, offline weather forecasts, and Wikipedia for a wealth of information. The paragraph also advises having offline survival and first aid guides, as well as an app for identifying wild edibles and herbs. The importance of keeping the digital bug out bag ready, updated, and easily accessible in an emergency is stressed, along with the suggestion to share this knowledge with others.
Mindmap
Keywords
💡Emergency Survival Kit
💡Digital Bug Out Bag
💡Encryption
💡VeraCrypt
💡MicroSD Card
💡Physical Security
💡Faraday Bag
💡Password Manager
💡Two-Factor Authentication (2FA)
💡Offline Apps
💡Operational Security (OpSec)
Highlights
The International Red Cross recommends having an emergency survival kit with multi-day supplies for natural or man-made crises.
A digital bug out bag includes personal documents, a cell phone with chargers, and emergency contact information.
Physical documents can be easily destroyed or lost, necessitating secure digital backups.
Secure digital backups can be encrypted and stored on a microSD card for added protection.
A microSD card is chosen for its versatility, size, and resilience against malware.
VeraCrypt is a cross-platform encryption app used to create secure digital backups.
VeraCrypt allows for encrypted files, partitions, and even entire operating systems.
Hidden volumes in VeraCrypt provide plausible deniability for sensitive data.
Choosing a strong passphrase is crucial for protecting the encrypted volume.
A live Linux operating system is recommended for verifying VeraCrypt's checksum for security.
Creating an encrypted volume on a microSD card ensures the backup is secure and portable.
Including a medication list, medical information, and proof of address in the digital backup is advised.
Using a password manager like KeePassXC to securely store login details is recommended.
Backing up two-factor authentication (2FA) is essential for maintaining account access in an emergency.
Physical security of the digital backup, such as using a waterproof Faraday bag, is as important as encryption.
Including offline apps for navigation, weather forecasting, and survival guides in the digital bug out bag is crucial.
The digital bug out bag should be ready, updated, and easily accessible in case of an emergency.
Sharing the knowledge of creating a digital bug out bag can help others prepare for unforeseen crises.
Transcripts
international red cross recommends that
all persons have an emergency survival
kit with multi-day supplies of the most
essential items this is in case of any
natural or main-made crisis resulting in
a need for evacuation or a major
disruption of day-to-day services part
of this emergency kit is what i would
call a digital bug out bag it includes
copies of personal documents cell phone
with chargers and extra batteries and
family and emergency contact information
many if not all of these copies should
be physical but paper documents can
easily get destroyed by floods fire and
collapse they can be lost or stolen and
in case of theft your paper documents
are not encrypted and they could be
easily abused for fraud which is the
last thing you want to think about in a
crisis
having a secure digital backup gives you
an additional fail save if all else is
lost hopefully you will never be in a
situation where you need this but it's
always better to be prepared because
this can save you the precious seconds
that might be decisive in an emergency
situation a digital copy has advantages
that are impossible to achieve with
physical papers you can securely encrypt
your files on a tiny microsd card that
can fit inside anything if someone
steals it they wouldn't be able to read
the contents because it's so small it
can be significantly protected against
water fire and weather elements while
still remaining easily transportable a
small micro sd card can be hidden in a
ubiquitous item or zoomed into a piece
of clothing to prevent it from being
stolen you can put your card inside a
waterproof faraday bag and a fi approved
case alongside your cell phone chargers
and extra batteries a secure digital
backup gives you the flexibility you
need to adapt it to your particular
thread model depending on your situation
geography or country so in this short
tutorial i'll guide you through the
process of creating an encrypted digital
backup on a microsd card how to securely
copy and store your files and how to
protect it from theft loss and physical
elements i also extend this tutorial to
include emergency items and apps that
could help you better navigate through a
crisis situation this won't take long so
let's begin i chose a microsd card for
this purpose because it's the most
versatile storage medium for a digital
bug out bag technically a usb flash
drive will be the most widely accepted
standard among any modern computer
laptop or even mobile devices however
usb drives are usually bigger and
thicker than just the raw frame of a
micro sd card and hiding your encrypted
backup might be just as important as
encrypting it if you want to go for
something like attaching a usb drive to
your keychain and always keeping it with
you and you don't want to hide your
backup out of sight then choose a usb
drive whatever option is better than
nothing
sd cards generally provide larger
capacity much cheaper than usb flash
drives sd cards are also more resilient
than flash drives against malware that
could be carried on the medium to other
computers once you chose your storage
medium it's time to encrypt our
encryption software of choice is going
to be veracrypt it's a cross-platform
free and open source encryption app that
works on windows mac and linux it is
able to create encrypted files
partitions and even entire operating
systems you can also provide hidden
volumes and hidden operating systems
with a decay volume if you need
plausible deniability for when you are
forced to unlock your data download the
app from veracrypt.fr
and before installing it verify your
download for additional security
veracrypt has a guide on how to verify
their signatures for windows and linux
i'm using linux so that's what i'm
following here for best security for
hidden volumes use a live linux
operating system first verify the
checksum with the simple sha256 sum
command and compare the output to what's
published on the vercredit website
checksums are in a file that can be
found at the bottom of the downloads
page if there is a match i can proceed
pgp verification is just a matter of
copy pasting gpg commands into the
terminal and adjusting for the current
version of verified i'm looking for good
signature in the output once
verification is done i can install when
you install veracrypt you can start
encrypting your storage
encrypting an entire partition or drive
will erase all of your data so be
careful to select correctly you can
choose to create an encrypted verified
volume that will act as a normal file
that can be copied or sent over the
internet this file can be securely
stored on your sd card the advantage of
this setup is that you can keep a backup
at your trusted friends location and
have them send you the volume over the
internet that only you will be able to
decrypt make sure you select the proper
size of the volume so that it can house
all of the documents and files you want
to protect i'm going to choose to
encrypt my entire card because i don't
have a trusted friend because i have no
friends and i don't know if i can keep
doing this any longer modern encryption
algorithms rarely get mathematically
broken but it could happen in the future
if you're optimistic about having a
future in the first place choose a
cascading encryption algo to have that
sail fave and have more future proof
security the probability that three
distinct encryption algorithms will be
broken is significantly lower than the
probability that only one of them will
be broken there is an option to select a
hidden or a standard vertical volume
encryption is the same the only
difference is that with a hidden volume
you create a decoy volume with junk data
that you don't mind disclosing to your
adversaries and a real volume they don't
want to share with untrusted parties
they are protected by different
passwords and will only be unlocked when
a correct password is entered if all the
security precautions are met your
adversary shouldn't be able to prove you
have a hidden volume hence it gives you
possible deniability when you're forced
to give up your password i recommend
that you check vercrypt's official
security requirements or hidden volumes
if you want to go this route to keep
this tutorial simple i'll go for a
standard encrypted volume assume someone
could get physical access to your
encrypted volume and they could attack
it with trillions of guesses per second
choose a strong passphrase that's at
least 30 characters long it's best to
make a memorable phrase that's long and
doesn't contain any special characters
to keep it simple for your memory do
what works for you but remember if you
forget your passphrase you'll never
unlock your volume a phrase like
splinter it into a thousand pieces and
scattered into the winds is 53
characters long easily memorable and
most definitely uncrackable unless we're
talking about cracking skulls with magic
bullets
for most of the veracrypt setup you go
for the default settings and follow the
steps until you finish the process once
you've created your encrypted volume
it's time to make copies of your most
important documents make sure to do this
using a secure scanner or a camera that
is not connected to the internet open
verscrypt and mount your volume using
your passwords transfer your copies into
the volume and leave you original copies
from your camera or scanner think about
what to include in your secure backup
red cross recommends medication list and
medical information the proof of address
a deed or lease to your home passports
birth certificates and insurance
policies think about also about the
files of the people in your household i
would also add to this list any personal
photos or files you want to keep and
also your passwords for this i would
recommend a password database that you
can generate using password manager
keepassxc download keypads from the
official website and make a backup of
all the login details you use you should
be using a password manager anyway to
make strong and unique passwords for all
of your online services your password
database will be encrypted for
additional protection so that when you
unlock your verified volume your
passwords are still protected remember
to also securely backup your second
factory authentication you should use a
2fa for your online accounts for better
security if you lose your second factors
you might lose access into your accounts
and recovery might take days it's always
best practice to make backups of 2fa as
well once you're done with securely
backing up all your important files
create a backup of your backup because
one is done and none is two or two is
one i don't know whatever to securely
backup your secure backup don't just
copy your veracrypt volume file into a
new location instead create a new
vertrip volume following the same steps
mount your main volume and your new
volume and copy and paste all the files
from your main vertex volume into the
new one
if you're encrypting an entire card like
i do you will need two cards protecting
physical security of your backups is
just as important as the encryption
itself give me the password it's always
better having to avoid torture in
exchange for your passphrase
by not revealing to your adversary you
have a digital backup in the first place
michael basil uses a coin that can fit a
micro sd card in it other solutions
could be toys clothing or low value
items of no particular interest keep in
mind that you want to protect your card
from damage dust and weather elements
you might want to have a waterproof
faraday bag that can also house your
cell phone batteries and chargers if you
use a tactical looking faraday bag it
might hint to your adversaries you're
keeping something of value so always
consider your operation security out of
sight is out of mind that's it for the
encrypted backups now let's add some
more items into our emergency digital
bug out bag a waterproof or a fireproof
faraday bag might come in handy when it
comes to your most important devices you
should have a dumb phone with multiple
sim cards to always have the best
connection available in your area pack
extra chargers batteries cables and a
power bank if you use speedo security
tokens for your 2fa check a backup of
those as well i use nitro keys because
they are the most secure solo key only
here even a yubikey is better than
nothing house keys car keys could also
be stored safely inside a weatherproof
faraday bag when it comes to your
smartphone you should download apps with
offline content for emergency situation
my list includes osmn this is a free and
open source privacy respective map and
navigation app be sure to download
offline apps into your phone and update
them regularly
trailsims is a good app for navigation
off track offline weather forecast and
survival offline wikipedia is a huge
source of relevant information download
as much as you can and is important to
survival in emergency situations it's
always handy to have an offline survival
guide in a digital form that can be read
at night without available lights the
same goes for first aid and medical
guides you should also keep an app that
helps you recognize plants and organisms
based on their appearance so you can
forage for wild edibles and herbs your
digital bug out bag should always be
ready updated and available it should be
a grab-and-go bag that you always know
what's inside and you don't have to
think about it in an emergency if you
have any questions or points to discuss
head over to my suburb for input from
the community comments your ideas and
points to consider for a digital bug out
back and share this video with everyone
around you you might never know when
this information might be needed
hopefully never but you all know you're
not hopeful you're just hiding your
crippling depression or maybe that's
just me
you
関連動画をさらに表示
Project DINA: Emergency Survival Kit
КАК ЗАЩИТИТЬ ДАННЫЕ | Руководство по основам безопасности
iOS 17.3, DISPOSITIVO R0UBADO e Mais NOVIDADES
7 Ways to Survive Natural Disasters
8 Things to Bring & NOT to Bring to Germany! (& Europe)
Online Safety, Security, Ethics, and Etiquette in using ICT - Empowerment Technologies K to 12
5.0 / 5 (0 votes)