You Should Make A Digital Bugout Bag

The Hated One
18 Mar 202211:32

Summary

TLDRThis video script emphasizes the importance of a digital bug out bag, an emergency survival kit with encrypted digital backups of essential documents on a microSD card using VeraCrypt. It guides viewers on how to create secure backups, protect them from theft and physical damage, and includes tips on essential apps for offline navigation, weather forecasts, and survival information. The tutorial aims to prepare individuals for crises where digital security and access to crucial information are vital.

Takeaways

  • 🆘 The International Red Cross recommends having an emergency survival kit with multi-day supplies for natural or man-made crises.
  • 📱 A 'digital bug out bag' should include personal documents, a cell phone with chargers and batteries, and emergency contact information.
  • 🔒 Digital documents should be securely backed up and encrypted to prevent loss, theft, and misuse in a crisis.
  • 💼 A microSD card is suggested as a compact and versatile storage medium for the digital bug out bag.
  • 🛡️ VeraCrypt is recommended as a cross-platform encryption software to secure files on the digital backup.
  • 🔑 A strong passphrase of at least 30 characters is crucial for encrypting the digital backup to ensure it remains uncrackable.
  • 📚 Important documents to include in the backup are medication lists, medical information, proof of address, legal documents, and insurance policies.
  • 🔐 Use a password manager like KeePassXC to securely store and backup all login details and two-factor authentication tokens.
  • 🔄 Create a backup of the backup to ensure redundancy and security of the digital bug out bag.
  • 🌳 Download offline apps for emergency situations, such as navigation, weather forecasts, survival guides, and plant identification tools.
  • 🚫 Consider operational security by hiding the digital backup in inconspicuous items to avoid drawing attention in a crisis.

Q & A

  • What is the purpose of an emergency survival kit according to the International Red Cross?

    -The purpose of an emergency survival kit is to provide multi-day supplies of essential items for use in case of natural or man-made crises that result in the need for evacuation or a major disruption of daily services.

  • What is a digital bug out bag and why is it important?

    -A digital bug out bag is a collection of digital essentials, including copies of personal documents, a cell phone with chargers and extra batteries, and emergency contact information. It is important because it provides an additional layer of security and accessibility for essential documents in case physical copies are lost or destroyed during an emergency.

  • Why should digital documents be encrypted?

    -Digital documents should be encrypted to protect them from being easily abused for fraud in case they are stolen or lost. Encryption ensures that even if the digital documents are accessed by unauthorized individuals, they cannot read the contents without the decryption key.

  • What are the advantages of using a microSD card for a digital backup?

    -A microSD card is advantageous for a digital backup because it is small, easily transportable, and can be securely encrypted. Its small size allows it to be hidden in various items, and it is more resilient against physical elements like water and fire compared to paper documents.

  • Why is VeraCrypt a suitable choice for encrypting a digital backup?

    -VeraCrypt is a suitable choice because it is a cross-platform, free, and open-source encryption application that works on Windows, Mac, and Linux. It can create encrypted files, partitions, and even entire operating systems, offering strong security measures such as hidden volumes for plausible deniability.

  • What is the significance of using a passphrase for encrypting a digital backup?

    -A passphrase is significant because it provides a layer of security to the encrypted volume. A strong passphrase should be at least 30 characters long and memorable to ensure that the encrypted data remains secure and cannot be easily guessed or cracked.

  • What are some important documents to include in a secure digital backup?

    -Important documents to include in a secure digital backup are medication lists, medical information, proof of address, deeds or leases, passports, birth certificates, insurance policies, and any personal photos or files one wishes to keep.

  • Why is it recommended to have a backup of your digital backup?

    -Having a backup of your digital backup ensures that even if the original backup is lost, damaged, or compromised, there is another secure copy available. This redundancy is crucial for maintaining the integrity and accessibility of important data in an emergency.

  • What are some items that should be included in an emergency digital bug out bag besides the encrypted backup?

    -Besides the encrypted backup, an emergency digital bug out bag should include a waterproof or fireproof Faraday bag, a dumb phone with multiple SIM cards, extra chargers, batteries, cables, a power bank, and backup 2FA tokens. It may also contain offline apps for navigation, weather forecasting, and survival guides.

  • What is the role of a Faraday bag in an emergency digital bug out bag?

    -A Faraday bag in an emergency digital bug out bag serves to protect electronic devices from electromagnetic pulses or interference, ensuring that they remain functional during an emergency. It can also be waterproof, adding an extra layer of protection against the elements.

  • What are some recommended apps for an emergency situation that can be used offline?

    -Recommended offline apps for an emergency situation include OSMn for privacy-respecting map and navigation, TrailSims for off-track navigation, offline weather forecasts, and survival guides such as Offline Wikipedia for a wealth of information and apps for recognizing wild edibles and herbs for foraging.

Outlines

00:00

🛡️ Emergency Preparedness with a Digital Bug Out Bag

The International Red Cross advises having an emergency survival kit equipped with multi-day essentials for natural or man-made crises. This includes a digital bug out bag with personal documents, a charged cell phone, and emergency contacts. Paper documents are vulnerable to damage or theft, and may not be secure against fraud. A secure digital backup on a microSD card, encrypted with VeraCrypt, provides an additional layer of security. The card can be small and hidden, protected against various elements, and easily transportable. The tutorial covers creating an encrypted backup, securely copying files, and protecting them from theft and physical damage. It also discusses the advantages of digital copies, such as encryption and resilience against environmental factors.

05:00

🔒 Secure Digital Backup and Encryption with VeraCrypt

The paragraph explains the process of encrypting a digital backup using VeraCrypt, a cross-platform, open-source encryption application. It highlights the benefits of using multiple encryption algorithms for enhanced security and the option of creating a hidden volume for plausible deniability. The importance of choosing a strong passphrase is emphasized, and the setup process for VeraCrypt is detailed, including the creation of an encrypted volume and the secure transfer of important documents. The paragraph also suggests backing up the encrypted volume and protecting the physical security of the backup. Additional items for the digital bug out bag, such as a waterproof Faraday bag and essential emergency apps, are recommended for comprehensive preparedness.

10:02

📲 Enhancing Emergency Preparedness with Essential Apps

This paragraph focuses on the importance of having offline apps for emergency situations on your smartphone. It recommends OSMn, a privacy-respecting map and navigation app, and suggests downloading offline maps for areas you may need to navigate. Other apps mentioned include Trailsims for off-track navigation, offline weather forecasts, and Wikipedia for a wealth of information. The paragraph also advises having offline survival and first aid guides, as well as an app for identifying wild edibles and herbs. The importance of keeping the digital bug out bag ready, updated, and easily accessible in an emergency is stressed, along with the suggestion to share this knowledge with others.

Mindmap

Keywords

💡Emergency Survival Kit

An 'Emergency Survival Kit' is a collection of essential items that one should have ready in case of a crisis, such as a natural disaster or a man-made emergency. In the video's context, it emphasizes the importance of having both physical and digital backups of vital documents and supplies. The script mentions that the International Red Cross recommends having a multi-day supply of essential items, including a 'digital bug out bag'.

💡Digital Bug Out Bag

A 'Digital Bug Out Bag' refers to a set of digital tools and files that one would need in an emergency situation. The script discusses the inclusion of personal documents, phone numbers, and other essential information in a digital format to ensure they are secure and easily accessible during a crisis. It is part of the broader concept of an emergency survival kit.

💡Encryption

Encryption is the process of converting data into a code to prevent unauthorized access. In the script, encryption is highlighted as a crucial method for securing digital documents within a 'digital bug out bag'. The video mentions using VeraCrypt, an encryption software, to create an encrypted volume on a microSD card to protect personal files.

💡VeraCrypt

VeraCrypt is a free, open-source disk encryption software mentioned in the script as the encryption tool of choice for creating a secure digital backup. It supports various platforms and can encrypt entire storage devices or create encrypted containers for files. The script provides a detailed guide on how to use VeraCrypt to encrypt a microSD card for a digital bug out bag.

💡MicroSD Card

A MicroSD card is a small, versatile storage medium that can be used to store digital backups. The script discusses using a MicroSD card for the digital bug out bag due to its size, portability, and capacity. It can be encrypted using VeraCrypt to store personal documents securely.

💡Physical Security

Physical security refers to the measures taken to protect physical items from theft, damage, or unauthorized access. In the context of the video, physical security is discussed in relation to protecting the digital backup stored on a MicroSD card. The script suggests using a waterproof Faraday bag to protect the card from environmental elements and theft.

💡Faraday Bag

A Faraday bag is a container designed to block external electromagnetic fields, thus protecting the contents from electronic theft or damage. The script mentions using a waterproof Faraday bag to store the encrypted MicroSD card, as well as other electronic devices and chargers, ensuring they are safe from both physical harm and electronic interference.

💡Password Manager

A password manager is a tool used to securely store and manage login credentials for various online accounts. The script recommends using a password manager like KeePassXC to generate strong, unique passwords and to create a secure backup of these passwords as part of the digital bug out bag. This ensures that access to online services remains secure even in an emergency.

💡Two-Factor Authentication (2FA)

Two-factor authentication, or 2FA, is a security method that requires two types of verification to access an account, typically something the user knows (a password) and something the user has (a physical token or app). The script advises having backup 2FA tokens or keys, such as Nitro Keys, to maintain account security in case the primary method is lost or inaccessible.

💡Offline Apps

Offline apps are applications that can function without an internet connection. The script suggests downloading offline versions of essential apps for navigation, weather forecasting, and survival guides to be included in the digital bug out bag. These apps can provide valuable information and services during a crisis when network access may be unavailable.

💡Operational Security (OpSec)

Operational security, or OpSec, involves the measures taken to protect sensitive information from being discovered by adversaries. In the script, OpSec is discussed in the context of hiding the digital bug out bag and its contents to avoid drawing attention to the valuable information it contains. The video mentions considering the appearance of the Faraday bag to ensure it does not hint at the presence of valuable items.

Highlights

The International Red Cross recommends having an emergency survival kit with multi-day supplies for natural or man-made crises.

A digital bug out bag includes personal documents, a cell phone with chargers, and emergency contact information.

Physical documents can be easily destroyed or lost, necessitating secure digital backups.

Secure digital backups can be encrypted and stored on a microSD card for added protection.

A microSD card is chosen for its versatility, size, and resilience against malware.

VeraCrypt is a cross-platform encryption app used to create secure digital backups.

VeraCrypt allows for encrypted files, partitions, and even entire operating systems.

Hidden volumes in VeraCrypt provide plausible deniability for sensitive data.

Choosing a strong passphrase is crucial for protecting the encrypted volume.

A live Linux operating system is recommended for verifying VeraCrypt's checksum for security.

Creating an encrypted volume on a microSD card ensures the backup is secure and portable.

Including a medication list, medical information, and proof of address in the digital backup is advised.

Using a password manager like KeePassXC to securely store login details is recommended.

Backing up two-factor authentication (2FA) is essential for maintaining account access in an emergency.

Physical security of the digital backup, such as using a waterproof Faraday bag, is as important as encryption.

Including offline apps for navigation, weather forecasting, and survival guides in the digital bug out bag is crucial.

The digital bug out bag should be ready, updated, and easily accessible in case of an emergency.

Sharing the knowledge of creating a digital bug out bag can help others prepare for unforeseen crises.

Transcripts

play00:00

international red cross recommends that

play00:02

all persons have an emergency survival

play00:04

kit with multi-day supplies of the most

play00:06

essential items this is in case of any

play00:08

natural or main-made crisis resulting in

play00:11

a need for evacuation or a major

play00:13

disruption of day-to-day services part

play00:15

of this emergency kit is what i would

play00:17

call a digital bug out bag it includes

play00:19

copies of personal documents cell phone

play00:22

with chargers and extra batteries and

play00:24

family and emergency contact information

play00:26

many if not all of these copies should

play00:28

be physical but paper documents can

play00:30

easily get destroyed by floods fire and

play00:33

collapse they can be lost or stolen and

play00:35

in case of theft your paper documents

play00:38

are not encrypted and they could be

play00:39

easily abused for fraud which is the

play00:41

last thing you want to think about in a

play00:43

crisis

play00:44

having a secure digital backup gives you

play00:46

an additional fail save if all else is

play00:49

lost hopefully you will never be in a

play00:51

situation where you need this but it's

play00:53

always better to be prepared because

play00:55

this can save you the precious seconds

play00:57

that might be decisive in an emergency

play00:59

situation a digital copy has advantages

play01:02

that are impossible to achieve with

play01:03

physical papers you can securely encrypt

play01:06

your files on a tiny microsd card that

play01:09

can fit inside anything if someone

play01:11

steals it they wouldn't be able to read

play01:13

the contents because it's so small it

play01:16

can be significantly protected against

play01:18

water fire and weather elements while

play01:20

still remaining easily transportable a

play01:22

small micro sd card can be hidden in a

play01:25

ubiquitous item or zoomed into a piece

play01:27

of clothing to prevent it from being

play01:29

stolen you can put your card inside a

play01:31

waterproof faraday bag and a fi approved

play01:33

case alongside your cell phone chargers

play01:35

and extra batteries a secure digital

play01:37

backup gives you the flexibility you

play01:39

need to adapt it to your particular

play01:41

thread model depending on your situation

play01:43

geography or country so in this short

play01:46

tutorial i'll guide you through the

play01:47

process of creating an encrypted digital

play01:49

backup on a microsd card how to securely

play01:52

copy and store your files and how to

play01:54

protect it from theft loss and physical

play01:57

elements i also extend this tutorial to

play01:59

include emergency items and apps that

play02:01

could help you better navigate through a

play02:03

crisis situation this won't take long so

play02:06

let's begin i chose a microsd card for

play02:08

this purpose because it's the most

play02:11

versatile storage medium for a digital

play02:13

bug out bag technically a usb flash

play02:15

drive will be the most widely accepted

play02:17

standard among any modern computer

play02:19

laptop or even mobile devices however

play02:22

usb drives are usually bigger and

play02:24

thicker than just the raw frame of a

play02:26

micro sd card and hiding your encrypted

play02:29

backup might be just as important as

play02:31

encrypting it if you want to go for

play02:34

something like attaching a usb drive to

play02:36

your keychain and always keeping it with

play02:38

you and you don't want to hide your

play02:40

backup out of sight then choose a usb

play02:42

drive whatever option is better than

play02:45

nothing

play02:46

sd cards generally provide larger

play02:48

capacity much cheaper than usb flash

play02:50

drives sd cards are also more resilient

play02:52

than flash drives against malware that

play02:55

could be carried on the medium to other

play02:57

computers once you chose your storage

play02:59

medium it's time to encrypt our

play03:01

encryption software of choice is going

play03:03

to be veracrypt it's a cross-platform

play03:06

free and open source encryption app that

play03:08

works on windows mac and linux it is

play03:10

able to create encrypted files

play03:12

partitions and even entire operating

play03:15

systems you can also provide hidden

play03:17

volumes and hidden operating systems

play03:19

with a decay volume if you need

play03:21

plausible deniability for when you are

play03:23

forced to unlock your data download the

play03:26

app from veracrypt.fr

play03:28

and before installing it verify your

play03:30

download for additional security

play03:32

veracrypt has a guide on how to verify

play03:34

their signatures for windows and linux

play03:37

i'm using linux so that's what i'm

play03:39

following here for best security for

play03:41

hidden volumes use a live linux

play03:43

operating system first verify the

play03:45

checksum with the simple sha256 sum

play03:48

command and compare the output to what's

play03:50

published on the vercredit website

play03:52

checksums are in a file that can be

play03:54

found at the bottom of the downloads

play03:56

page if there is a match i can proceed

play03:59

pgp verification is just a matter of

play04:02

copy pasting gpg commands into the

play04:04

terminal and adjusting for the current

play04:06

version of verified i'm looking for good

play04:08

signature in the output once

play04:10

verification is done i can install when

play04:12

you install veracrypt you can start

play04:14

encrypting your storage

play04:16

encrypting an entire partition or drive

play04:18

will erase all of your data so be

play04:21

careful to select correctly you can

play04:23

choose to create an encrypted verified

play04:25

volume that will act as a normal file

play04:28

that can be copied or sent over the

play04:29

internet this file can be securely

play04:32

stored on your sd card the advantage of

play04:34

this setup is that you can keep a backup

play04:36

at your trusted friends location and

play04:38

have them send you the volume over the

play04:40

internet that only you will be able to

play04:42

decrypt make sure you select the proper

play04:44

size of the volume so that it can house

play04:47

all of the documents and files you want

play04:48

to protect i'm going to choose to

play04:50

encrypt my entire card because i don't

play04:53

have a trusted friend because i have no

play04:54

friends and i don't know if i can keep

play04:56

doing this any longer modern encryption

play04:58

algorithms rarely get mathematically

play05:00

broken but it could happen in the future

play05:02

if you're optimistic about having a

play05:04

future in the first place choose a

play05:06

cascading encryption algo to have that

play05:08

sail fave and have more future proof

play05:10

security the probability that three

play05:13

distinct encryption algorithms will be

play05:14

broken is significantly lower than the

play05:17

probability that only one of them will

play05:19

be broken there is an option to select a

play05:21

hidden or a standard vertical volume

play05:23

encryption is the same the only

play05:25

difference is that with a hidden volume

play05:28

you create a decoy volume with junk data

play05:30

that you don't mind disclosing to your

play05:32

adversaries and a real volume they don't

play05:35

want to share with untrusted parties

play05:37

they are protected by different

play05:38

passwords and will only be unlocked when

play05:40

a correct password is entered if all the

play05:43

security precautions are met your

play05:45

adversary shouldn't be able to prove you

play05:47

have a hidden volume hence it gives you

play05:50

possible deniability when you're forced

play05:52

to give up your password i recommend

play05:54

that you check vercrypt's official

play05:55

security requirements or hidden volumes

play05:58

if you want to go this route to keep

play06:00

this tutorial simple i'll go for a

play06:02

standard encrypted volume assume someone

play06:05

could get physical access to your

play06:06

encrypted volume and they could attack

play06:08

it with trillions of guesses per second

play06:10

choose a strong passphrase that's at

play06:12

least 30 characters long it's best to

play06:15

make a memorable phrase that's long and

play06:17

doesn't contain any special characters

play06:19

to keep it simple for your memory do

play06:21

what works for you but remember if you

play06:23

forget your passphrase you'll never

play06:25

unlock your volume a phrase like

play06:27

splinter it into a thousand pieces and

play06:29

scattered into the winds is 53

play06:32

characters long easily memorable and

play06:34

most definitely uncrackable unless we're

play06:37

talking about cracking skulls with magic

play06:39

bullets

play06:40

for most of the veracrypt setup you go

play06:42

for the default settings and follow the

play06:44

steps until you finish the process once

play06:46

you've created your encrypted volume

play06:48

it's time to make copies of your most

play06:50

important documents make sure to do this

play06:52

using a secure scanner or a camera that

play06:55

is not connected to the internet open

play06:57

verscrypt and mount your volume using

play06:59

your passwords transfer your copies into

play07:01

the volume and leave you original copies

play07:03

from your camera or scanner think about

play07:05

what to include in your secure backup

play07:07

red cross recommends medication list and

play07:10

medical information the proof of address

play07:12

a deed or lease to your home passports

play07:15

birth certificates and insurance

play07:17

policies think about also about the

play07:19

files of the people in your household i

play07:21

would also add to this list any personal

play07:23

photos or files you want to keep and

play07:25

also your passwords for this i would

play07:27

recommend a password database that you

play07:29

can generate using password manager

play07:31

keepassxc download keypads from the

play07:34

official website and make a backup of

play07:36

all the login details you use you should

play07:38

be using a password manager anyway to

play07:40

make strong and unique passwords for all

play07:42

of your online services your password

play07:44

database will be encrypted for

play07:46

additional protection so that when you

play07:48

unlock your verified volume your

play07:49

passwords are still protected remember

play07:52

to also securely backup your second

play07:53

factory authentication you should use a

play07:55

2fa for your online accounts for better

play07:58

security if you lose your second factors

play08:00

you might lose access into your accounts

play08:02

and recovery might take days it's always

play08:05

best practice to make backups of 2fa as

play08:07

well once you're done with securely

play08:10

backing up all your important files

play08:12

create a backup of your backup because

play08:14

one is done and none is two or two is

play08:17

one i don't know whatever to securely

play08:19

backup your secure backup don't just

play08:21

copy your veracrypt volume file into a

play08:23

new location instead create a new

play08:27

vertrip volume following the same steps

play08:30

mount your main volume and your new

play08:32

volume and copy and paste all the files

play08:34

from your main vertex volume into the

play08:37

new one

play08:38

if you're encrypting an entire card like

play08:40

i do you will need two cards protecting

play08:43

physical security of your backups is

play08:45

just as important as the encryption

play08:46

itself give me the password it's always

play08:49

better having to avoid torture in

play08:51

exchange for your passphrase

play08:54

by not revealing to your adversary you

play08:56

have a digital backup in the first place

play08:58

michael basil uses a coin that can fit a

play09:00

micro sd card in it other solutions

play09:02

could be toys clothing or low value

play09:05

items of no particular interest keep in

play09:08

mind that you want to protect your card

play09:09

from damage dust and weather elements

play09:12

you might want to have a waterproof

play09:13

faraday bag that can also house your

play09:15

cell phone batteries and chargers if you

play09:18

use a tactical looking faraday bag it

play09:20

might hint to your adversaries you're

play09:22

keeping something of value so always

play09:24

consider your operation security out of

play09:26

sight is out of mind that's it for the

play09:29

encrypted backups now let's add some

play09:31

more items into our emergency digital

play09:33

bug out bag a waterproof or a fireproof

play09:35

faraday bag might come in handy when it

play09:37

comes to your most important devices you

play09:39

should have a dumb phone with multiple

play09:41

sim cards to always have the best

play09:42

connection available in your area pack

play09:45

extra chargers batteries cables and a

play09:47

power bank if you use speedo security

play09:49

tokens for your 2fa check a backup of

play09:52

those as well i use nitro keys because

play09:54

they are the most secure solo key only

play09:56

here even a yubikey is better than

play09:59

nothing house keys car keys could also

play10:01

be stored safely inside a weatherproof

play10:03

faraday bag when it comes to your

play10:05

smartphone you should download apps with

play10:07

offline content for emergency situation

play10:10

my list includes osmn this is a free and

play10:13

open source privacy respective map and

play10:15

navigation app be sure to download

play10:17

offline apps into your phone and update

play10:19

them regularly

play10:21

trailsims is a good app for navigation

play10:23

off track offline weather forecast and

play10:25

survival offline wikipedia is a huge

play10:28

source of relevant information download

play10:30

as much as you can and is important to

play10:32

survival in emergency situations it's

play10:34

always handy to have an offline survival

play10:36

guide in a digital form that can be read

play10:38

at night without available lights the

play10:40

same goes for first aid and medical

play10:42

guides you should also keep an app that

play10:44

helps you recognize plants and organisms

play10:46

based on their appearance so you can

play10:48

forage for wild edibles and herbs your

play10:51

digital bug out bag should always be

play10:52

ready updated and available it should be

play10:55

a grab-and-go bag that you always know

play10:57

what's inside and you don't have to

play10:59

think about it in an emergency if you

play11:00

have any questions or points to discuss

play11:02

head over to my suburb for input from

play11:04

the community comments your ideas and

play11:06

points to consider for a digital bug out

play11:08

back and share this video with everyone

play11:10

around you you might never know when

play11:12

this information might be needed

play11:14

hopefully never but you all know you're

play11:15

not hopeful you're just hiding your

play11:17

crippling depression or maybe that's

play11:19

just me

play11:32

you

Rate This

5.0 / 5 (0 votes)

Related Tags
Emergency PrepDigital SecurityData BackupEncryption GuideSurvival KitDisaster ResponseCyber ProtectionPersonal DocumentsOffline AppsCrisis Management