Traveling while LGBTQ+ requires a layer of preparation that most travel guides never mention. In over 60 countries, same-sex relationships are criminalized. In a dozen, they carry the death penalty. Even in countries without explicit anti-LGBTQ+ laws, cultural hostility can make a routine device search at a border checkpoint genuinely dangerous.
Your phone and laptop contain your identity. Dating apps, browser history, photos, message threads, saved passwords, and search history can all reveal your orientation or gender identity in seconds. This checklist helps you secure your devices before, during, and after international travel to hostile or unfamiliar regions.
Assess Your Destination Risk Level
Not all travel destinations carry the same risk. Your security preparations should match the threat level. Research your specific destination, but here is a general framework:
High Risk — Criminalization with active enforcement
Countries that actively prosecute LGBTQ+ individuals, monitor digital communications, or use device searches to gather evidence. Examples include Iran, Saudi Arabia, Uganda, Brunei, and others with recent enforcement actions. Preparation: full device sanitization or clean travel device.
Medium Risk — Criminalization with inconsistent enforcement
Countries with anti-LGBTQ+ laws on the books but uneven enforcement, or countries where social hostility is significant even without legal penalties. Preparation: Travel Mode, app removal, thorough digital cleanup.
Lower Risk — No criminalization but potential border scrutiny
Countries without anti-LGBTQ+ laws but with aggressive border search policies or cultural sensitivities. The risk is primarily from device inspection revealing your identity to an individual officer, not systemic prosecution. Preparation: standard privacy hygiene and Travel Mode.
The Complete Device Security Checklist
Two Weeks Before Travel
- Research LGBTQ+ laws and enforcement in your destination and all transit countries
- Decide whether to sanitize your current device or travel with a clean device
- If using a clean device, purchase and set it up with only essential apps
- Set up a privacy-focused VPN and test it from your destination country (some countries block common VPNs)
- Configure Travel Mode in your password manager and test it
- Set up a duress PIN and populate your decoy vault
- Designate and brief trusted contacts on your travel plan
- Research whether your destination country blocks encrypted messaging apps
- Create a secure, encrypted backup of your full device at home
One Week Before Travel
- Enable full-disk encryption on all travel devices (FileVault, BitLocker, or built-in mobile encryption)
- Set a strong alphanumeric passcode — not just a 4-digit PIN
- Disable biometric unlock (Face ID, fingerprint) — biometrics can be compelled more easily than passwords in many jurisdictions
- Review and remove any dating apps from your device
- Review your photo library — remove or encrypt sensitive images
- Clear browser history, downloads, and autofill data
- Review installed apps for anything that could reveal your identity
- Check notification settings — disable preview text on lock screen for all messaging apps
- Set up a secure communication channel with trusted contacts (Signal with disappearing messages is a common choice)
24 Hours Before Departure
- Activate Travel Mode in your password manager
- Log out of all social media accounts and remove saved sessions
- Clear clipboard data
- Verify that VPN is working and that you know how to activate it quickly
- Confirm your trusted contacts have your itinerary and know your check-in schedule
- Write down essential phone numbers on paper (embassy, legal aid, trusted contacts) — do not rely solely on your phone
- Remove your SIM card if you are using a local SIM at your destination (prevents carrier-level tracking during transit)
At the Border / Airport
- Power off your device completely before reaching passport control (forces full-disk encryption to engage)
- Verify biometric unlock is disabled — the power-off should do this on most devices, but double check
- If asked to unlock your device, remain calm and comply if refusing would put you at risk
- Use the duress PIN if you need to show your password vault
- Do not volunteer information about Travel Mode, hidden vaults, or security measures
- If your device is taken out of your sight, assume it has been compromised
- Note names and badge numbers of any officials who handle your device
During Travel
- Use your VPN whenever connected to any network
- Avoid public Wi-Fi for anything sensitive — use mobile data when possible
- Do not install dating apps while in a hostile country
- Use encrypted messaging (Signal, Wire) for all personal communication
- Enable disappearing messages for sensitive conversations
- Check in with your trusted contacts on schedule
- Be aware of your surroundings when using your phone — shoulder surfing is a real threat
- Do not use location-based services or check-ins that could be monitored
- If you must access sensitive accounts, do so through a VPN and log out completely afterward
After Returning Home
- Disable Travel Mode and restore your vaults
- Change your master password if your device was out of your possession at any point
- Review all account activity for unauthorized access during your trip
- Reinstall apps you removed before travel
- Restore your device from backup if you used a clean travel device
- Debrief your trusted contacts
- Update any passwords that were used during travel, as a precaution
Disabling Biometrics at Borders: Why and How
This deserves special emphasis. In the United States and many other jurisdictions, courts have generally held that you can be compelled to provide biometric data (your face or fingerprint) to unlock a device, but you cannot be compelled to reveal something you know (a memorized passcode). The legal distinction between "something you are" and "something you know" is significant.
By disabling biometric unlock before you reach the border, you ensure that the only way into your device is through a passcode — which may have stronger legal protection. Here is how to do it on major platforms:
iPhone / iPad
Press and hold the side button and either volume button for two seconds. The power-off slider appears, and biometric unlock is disabled until you enter your passcode. Alternatively, pressing the side button five times rapidly triggers Emergency SOS mode, which also disables biometrics.
Android
Most Android devices disable biometrics after a restart. Power off your device before reaching the border. On Samsung devices, you can also enable "Lockdown mode" from the power menu, which disables biometrics and hides notifications.
Laptop (macOS)
Shut down the laptop completely. Touch ID is disabled until the password is entered after a cold boot.
Laptop (Windows)
Shut down completely. Windows Hello (facial recognition or fingerprint) is disabled until the password is entered after a cold boot.
Jurisdiction-Aware Alerts
Some privacy-focused tools can alert you when your device enters a jurisdiction with anti-LGBTQ+ laws or aggressive device search policies. These alerts can remind you to activate Travel Mode, disable biometrics, or take other protective steps. Even without automated alerts, you can set calendar reminders for specific points in your journey where you need to take security actions.
The key moments to trigger security steps:
- Before boarding your flight — Activate Travel Mode and remove apps.
- Before landing in a transit country — Even layovers can involve border control in some countries.
- Before reaching passport control — Power off your device.
- When connecting to any new network — Activate your VPN first.
Encrypted Communication While Abroad
Standard text messages and phone calls are not encrypted and can be intercepted in many countries. Use end-to-end encrypted messaging for all personal communication while traveling:
- Signal — Open source, widely trusted, supports disappearing messages. May be blocked in some countries (use a VPN).
- Wire — End-to-end encrypted, can sign up without a phone number.
- Briar — Works without internet via Bluetooth and Wi-Fi, useful in extreme scenarios.
Avoid WhatsApp in high-risk countries, as metadata (who you talked to, when, and how often) is shared with Meta and could potentially be accessed by authorities even though message content is encrypted.
Recommended Travel Security Gear
These are the tools we recommend for LGBTQ+ travelers preparing for trips to hostile or unfamiliar countries:
Faraday Bag — Signal Blocking Pouch — Block all wireless signals to your phone during border crossings. Prevents location tracking, remote wiping, and unauthorized data access.
YubiKey 5 NFC — Hardware 2FA Key — Phishing-proof 2FA for your most critical accounts. Cannot be remotely intercepted or SIM-swapped.
Laptop Privacy Screen Filter — Prevent shoulder surfing in airports, cafes, and hotels.