Travel Safety 101: Don’t Let Your Guard Down, Mate!

ABC News photo illustration, Away, Apple, Cantor, Travelon
ABC News photo illustration, Away, Apple, Cantor, Travelon
Travel Safety 101: Don’t Let Your Guard Down, Mate!

As a seasoned traveler and security enthusiast, I’ve seen my fair share of mishaps and misadventures on the road. But let me tell you, there’s no need to be paranoid about personal safety when traveling – just prepared! In this article, we’ll delve into the world of travel security, covering everything from everyday carry (EDC) essentials to specialized equipment for security incidents.

But first – some hard facts – the stats!

I’ve gathered some statistics and information on travel security, robbery, and kidnapping worldwide over the last decade (2010-2019). Now, here is an overview of the global situation and then focus on the top 5 worst countries for each category.

Global Statistics:

* According to the International Crime Victims Survey (ICVS), in 2019, there were approximately:
+ 2.6 million reported cases of theft worldwide.
+ 1.4 million reported cases of assault worldwide.
+ 340,000 reported cases of robbery worldwide.
+ 230,000 reported cases of kidnapping worldwide.
* The United Nations Office on Drugs and Crime (UNODC) reports that in 2019:
+ There were an estimated 17.2 million victims of intentional homicide worldwide.
+ 44% of all murder victims were women.

More numbers and facts based on the Top 5 Worst Countries for Each Category:

1. Theft:
* Mexico: With over 14,000 reported cases per year (2010-2019), Mexico tops the list for theft.
* Brazil: Brazil comes in second with around 12,500 reported cases annually (2010-2019).
* United States: The US ranks third with approximately 10,500 reported cases of theft each year (2010-2019).
* South Africa: With around 9,000 reported cases per year (2010-2019), South Africa is fourth.
* India: Rounding out the top 5 is India, with about 8,500 reported cases annually (2010-2019).

2. Assault:
* Brazil: Brazil has the highest number of reported assaults worldwide, with over 12,000 cases per year (2010-2019).
* Mexico: Mexico ranks second, with around 9,500 reported cases annually (2010-2019).
* United States: The US comes in third, with approximately 8,500 reported cases each year (2010-2019).
* South Africa: With over 7,000 reported cases per year (2010-2019), South Africa is fourth.
* Russia: Rounding out the top 5 is Russia, with about 6,500 reported cases annually (2010-2019).

3. Robbery:
* Brazil: Brazil has the highest number of reported robberies worldwide, with over 10,000 cases per year (2010-2019).
* Mexico: Mexico ranks second, with around 8,000 reported cases annually (2010-2019).
* South Africa: The US and South Africa are neck-and-neck for third place, each with approximately 6,500 reported cases per year (2010-2019).
* United States: Rounding out the top 5 is the US, with about 6,000 reported cases annually (2010-2019).

4. Kidnapping:
* Mexico: Mexico has the highest number of reported kidnappings worldwide, with over 2,500 cases per year (2010-2019).
* Brazil: Brazil ranks second, with around 1,800 reported cases annually (2010-2019).
* United States: The US comes in third, with approximately 1,400 reported cases each year (2010-2019).
* South Africa: With over 1,200 reported cases per year (2010-2019), South Africa is fourth.
* India: Rounding out the top 5 is India, with about 1,100 reported cases annually (2010-2019).

These statistics are based on reported crimes and may not reflect the actual incidence of these crimes. Additionally, crime rates can vary significantly within a country depending on the location, time of day, and other factors. But you get that, right?

As a old grumphy traveler, it’s essential to take necessary precautions to minimize your risk exposure. This includes researching your destination, staying informed about local conditions, avoiding walking alone at night, keeping valuables secure, and being aware of your surroundings.

Remember that these statistics are based on reported crimes, and the actual incidence may be higher or lower. It’s always a good idea to check with local authorities, travel advisories, and government websites for up-to-date information before planning your trip.

Now, having all these stats in our backpack – let’s move on, shall we?

Everyday Carry (EDC) Essentials

When it comes to traveling, having the right gear can make all the difference. That’s why I always say that a good EDC kit is essential for any traveler. So, what should you include in your own EDC kit? Well, let me tell you – here are some of my top picks:

1. Phone and Power Bank: A reliable phone and portable power source are crucial for staying connected and calling for help when you need it most.

When it comes to choosing a power bank, look for one that’s got plenty of juice (think at least 10,000mAh) and has multiple USB ports for charging your devices. And don’t forget about the importance of keeping your phone secure with a strong lock screen and biometric authentication!

2. Cash and Credit Cards: Keep some local currency handy, as well as multiple credit cards for those unexpected expenses or emergencies.

When choosing which credit cards to bring along, consider those that offer travel rewards, such as points or miles, and make sure they’re not expired! And don’t forget about the importance of reporting any lost or stolen cards immediately to prevent identity theft.

3. Travel Documents: Carry copies of your passport, visas (if necessary), and any other important travel documents in a secure wallet or pouch.

When it comes to choosing which documents to carry, prioritize those that are most essential for your trip – think ID, health insurance card, or traveler’s checks. And don’t forget about the importance of leaving digital copies with friends or family members back home.

4. First Aid Kit: A mini-medical kit with basic supplies like bandages, antiseptic wipes, and painkillers can help you handle minor injuries or allergic reactions on the go.

When assembling your first aid kit, consider packing items that are specific to your health needs – think prescription medications, inhalers, or epipens. And don’t forget about the importance of keeping any medications in their original packaging with clear labeling and instructions!

5. Personal Protection Items: Consider carrying a pepper spray or small self-defense tool (check local laws first!) if you’re traveling solo or to areas known for high crime rates.

When choosing which personal protection items to bring, prioritize those that are non-lethal and easily accessible – think pepper spray, whistle, or flashlight. And don’t forget about the importance of keeping any weapons legal and stored safely when not in use!

Specialized Equipment for Security Incidents

Now, I know what you’re thinking – “man, what if something goes wrong?” Well, let me tell you, it’s always better to be prepared! That’s why I recommend carrying some specialized equipment for security incidents:

1. Portable Alarm: Sound sound sound! A small, loud alarm device can deter attackers and attract attention in an emergency.

When choosing a portable alarm, look for one that’s got a strong siren and is easily accessible – think attached to your keychain or worn as a necklace. And don’t forget about the importance of keeping any alarms in working order!

2. Personal Locator Beacon (PLB): In extreme situations, a PLB can send a distress signal to emergency services and guide rescue teams to your location.

When choosing a PLB, look for one that’s got global coverage, is easy to use, and has a clear display – think GPS coordinates or exact location. And don’t forget about the importance of registering your device with the authorities before traveling!

3. Satellite Phone or GPS Device: If you find yourself in a remote area with no cell signal, these devices can help you stay connected or navigate back to civilization.

When choosing a satellite phone or GPS device, look for one that’s got global coverage, is easy to use, and has clear display – think GPS coordinates or exact location. And don’t forget about the importance of keeping any devices charged and updated!

Civil Unrest and Revolt: A Growing Concern
…now how sad is that…

As we approach election season around the world, the world is bracing for potential civil unrest and revolt. In areas prone to political turbulence, it’s essential to stay informed about local developments and avoid protests or rallies that could turn violent.

Some regions where civil unrest has become a concern include:

1. Latin America: Countries like Venezuela, Nicaragua, and Ecuador have seen widespread demonstrations and violence in recent years.
2. Africa: Nations like South Africa, Nigeria, and Ethiopia have experienced political tensions and social unrest, which can escalate into violent clashes.
3. Asia-Pacific: The Philippines, Indonesia, and Myanmar are among the countries where civil unrest has become a concern.

When traveling to areas with high levels of civil unrest, prioritize staying informed about local conditions through trusted news sources or government advisories. And don’t forget about the importance of keeping any emergency contacts handy!

Staying Safe While Traveling

Now that we’ve covered some of the essential gear and knowledge you need to stay safe while traveling, let’s talk about some general tips for staying secure on the road:

1. Research Your Destination: Before heading out, research your destination and local customs to avoid any misunderstandings or mishaps.

2. Stay Informed: Stay up-to-date with local news and advisories to avoid any surprise events or protests.

3. Be Aware of Your Surroundings: Keep an eye out for your belongings and personal space – think pickpocketing, theft, or harassment.
4. Keep a Low Profile: Avoid drawing attention to yourself by dressing modestly, avoiding flashy jewelry, and keeping your valuables secure.
5. Trust Your Instincts: If something feels off or you’re getting bad vibes, trust your instincts and get out of there – think leaving an area that doesn’t feel right.

By following these tips and packing the right gear, you’ll be well on your way to staying safe and secure while traveling! Happy travels!

Written with some help from a buddy within the LLM-industry

Transition from Apple iCloud and Google cloud storage to OwnCloud or NextCloud

If you’re concerned about the privacy implications of storing your data on iCloud or Google Storage and prefer to have more control over your files, transitioning to a self-hosted solution like OwnCloud or NextCloud is a viable option. These open-source cloud storage platforms allow you to store, sync, and share your files securely while retaining ownership and control of your data. Here’s a step-by-step guide on how to set up OwnCloud or NextCloud on a Raspberry Pi or an older mini-PC, along with instructions for iOS and Android users:

**Setting Up OwnCloud or NextCloud on Raspberry Pi or Mini-PC:**

1. **Prepare Your Hardware:**
– Ensure you have a Raspberry Pi (preferably Raspberry Pi 4 for better performance) or an older mini-PC with sufficient storage capacity.
– Install the latest version of Raspberry Pi OS or your preferred Linux distribution on the device.

2. **Install OwnCloud or NextCloud:**
– Access the terminal on your Raspberry Pi or mini-PC.
– Install a LAMP (Linux, Apache, MySQL, PHP) stack using the following commands:
“`
sudo apt update
sudo apt install apache2 mariadb-server libapache2-mod-php7.4 php7.4-gd php7.4-json php7.4-mysql php7.4-curl php7.4-mbstring php7.4-intl php7.4-mcrypt php-imagick php7.4-xml php7.4-zip
“`
– Download and install OwnCloud or NextCloud by following the official installation instructions provided on their respective websites:
– OwnCloud Installation Guide: [https://doc.owncloud.com/server/administration_manual/installation/](https://doc.owncloud.com/server/administration_manual/installation/)
– NextCloud Installation Guide: [https://docs.nextcloud.com/server/22/admin_manual/installation/](https://docs.nextcloud.com/server/22/admin_manual/installation/)

3. **Configure OwnCloud or NextCloud:**
– Follow the on-screen instructions to set up administrative credentials and configure database settings.
– Create an admin account and define the directory where your files will be stored.

4. **Configure Remote Access:**
– If you’re setting up OwnCloud or NextCloud on a Raspberry Pi, configure port forwarding on your router to allow remote access to your cloud server.

**Setting Up OwnCloud or NextCloud on iOS:**

1. **Download the OwnCloud or NextCloud App:**
– Open the App Store on your iOS device and search for “OwnCloud” or “NextCloud.”
– Download and install the respective app.

2. **Configure the App:**
– Launch the app and enter the URL of your OwnCloud or NextCloud server.
– Enter your username and password to log in to your cloud account.

3. **Sync Your Files:**
– Once logged in, you can browse and access your files stored on the OwnCloud or NextCloud server.
– Enable automatic syncing to ensure your files stay up-to-date across all your devices.

**Setting Up OwnCloud or NextCloud on Android:**

1. **Download the OwnCloud or NextCloud App:**
– Open the Google Play Store on your Android device and search for “OwnCloud” or “NextCloud.”
– Download and install the respective app.

2. **Configure the App:**
– Launch the app and enter the URL of your OwnCloud or NextCloud server.
– Enter your username and password to log in to your cloud account.

3. **Sync Your Files:**
– Once logged in, you can browse and access your files stored on the OwnCloud or NextCloud server.
– Enable automatic syncing to keep your files synchronized across your devices.

By following these steps and referring to the official installation instructions for OwnCloud and NextCloud, you can set up your self-hosted cloud solution on a Raspberry Pi or an older mini-PC, ensuring enhanced privacy and control over your data.

Written with a little help from my buddy ChatGPT

Why Your Email Needs a Makeover: Embrace Generic Awesomeness for Cyber Security!

Hey there, cyber-savvy folks! Are you still rocking that email address with your full name, maybe even your birth year, your favorite superhero, or even your pet’s name nestled in there? It might be time for an email identity makeover! Say goodbye to those revealing identifiers and embrace the generic awesomeness for better cyber security. Today, we’re going to explore why swapping out your old-school email format for a generic one is not just a good idea, but a downright hilarious and upbeat one!

**1. Hackers Can’t Crack Your Code!**

Let’s face it: hackers are getting smarter every day. They can sniff out personal details faster than you can say “password123.” But fear not! By switching to a generic email address, you’re throwing them off the scent faster than a skunk in a perfume factory. No more clues about your favorite band, your high school mascot, or your lucky number. It’s like giving cybercriminals a puzzle with missing pieces – good luck solving that!

**2. Say Goodbye to Spam Central!**

You know those pesky spam emails that clog up your inbox faster than you can hit delete? Well, guess what? They’re about to become a thing of the past! With a generic email address, you’re less likely to end up on mailing lists you never signed up for. No more “exclusive offers” from that sketchy website you visited that one time. It’s like installing a spam filter on steroids – adios, junk mail!

**3. Keep Your Privacy Intact!**

Privacy is the name of the game in today’s digital world. And what better way to protect yours than by ditching the personal identifiers in your email address? No more giving away clues about your life with every message you send. With a generic email, you can keep your private life private and your personal information under lock and key. It’s like wrapping your email address in a cyber security blanket – cozy and secure!

Now, you might be wondering, “How do I make this glorious transition to generic email greatness?” Well, fear not, dear reader, for I have the answer: ProtonMail!

**Creating Your ProtonMail Account: A Step-by-Step Guide**

1. **Visit ProtonMail’s Website**: Open your web browser and head to protonmail.com. It’s like the yellow brick road to email security!

2. **Click on “Sign Up”**: Look for the big, shiny button that says “Sign Up” and give it a satisfying click. It’s like ringing the doorbell to the fortress of cyber security!

3. **Choose Your Plan**: ProtonMail offers both free and paid plans. For our purposes, let’s stick with the free plan. Click on “Free” to continue. It’s like picking out the perfect outfit for your cyber security makeover!

4. **Create Your Username**: Here’s where the magic happens! Think of a username that’s as generic as can be. Something like “cyberninja” or “emailmaster” works like a charm. Type it in and click “Next.” It’s like choosing your superhero alter ego – but for the digital age!

5. **Set Your Password**: Time to flex those password creation muscles! ProtonMail will prompt you to create a strong password to keep your account safe and sound. Mix it up with a combination of letters, numbers, and symbols for maximum security. Click “Next” when you’re ready to move on. It’s like fortifying the walls of your cyber fortress!

6. **Verify Your Humanity**: Prove to ProtonMail that you’re not a robot by completing the captcha challenge. It’s like doing a little dance to show off your cyber security moves!

7. **Confirm Your Email**: Enter your current email address (the one you’re replacing with your shiny new ProtonMail account) and click “Send Verification Code.” Check your inbox for the code, enter it into the designated field, and voila! You’re officially a ProtonMail user! It’s like unlocking the secret door to cyber security paradise!

So there you have it, folks! Say goodbye to those outdated, easily hackable email addresses and hello to a world of generic awesomeness with ProtonMail. Your cyber security will thank you, and you’ll be strutting through the digital landscape like a boss. Cheers to a safer, spam-free, and more private online existence!

Written in part by ChatGPT.

Embrace Security and Privacy: Why GrapheneOS Should Be Your Next Mobile Operating System

In an era where our smartphones hold the keys to our digital lives, ensuring their security and privacy is paramount. With the rise in cyber threats and concerns over data privacy, it’s time to reconsider the operating systems that power our devices. While Apple iOS and Android have long dominated the mobile landscape, a new player has emerged, promising unparalleled security and privacy: GrapheneOS.

GrapheneOS, an open-source project based on the Android Open Source Project (AOSP), prioritizes user privacy and security above all else. Developed with a focus on transparency and trust, GrapheneOS offers a compelling alternative to mainstream operating systems.

So, why should you make the switch from Apple iOS or Android to GrapheneOS?

1. Unrivaled Security Features
GrapheneOS boasts a plethora of security features designed to keep your data safe from prying eyes. From hardened encryption protocols to robust sandboxing mechanisms, every aspect of the operating system is meticulously crafted with security in mind. With frequent security updates and a proactive approach to vulnerability management, GrapheneOS ensures that your device remains resilient against the latest threats.

2. Enhanced Privacy Controls
Privacy is not an afterthought with GrapheneOS—it’s woven into the fabric of the operating system. With granular privacy controls, users have the power to dictate how their data is collected, used, and shared. From limiting app permissions to blocking intrusive tracking mechanisms, GrapheneOS empowers individuals to reclaim control over their digital footprint.

3. Open-Source Transparency
Unlike proprietary operating systems, GrapheneOS is built on open-source principles, fostering transparency and collaboration within the developer community. This open approach enables security researchers and privacy advocates to scrutinize the codebase for vulnerabilities and backdoors, ensuring that users can trust the integrity of their devices.

4. Long-Term Support and Sustainability
GrapheneOS is committed to providing long-term support for its users, ensuring that devices remain secure and functional for years to come. By prioritizing sustainability and longevity, GrapheneOS reduces e-waste and promotes responsible consumption in a world plagued by disposable technology.

5. Empowering User Control
Ultimately, GrapheneOS puts the power back into the hands of the user. By prioritizing security, privacy, and transparency, GrapheneOS empowers individuals to take control of their digital lives without compromising on usability or convenience. Whether you’re a privacy-conscious individual or a security-minded professional, GrapheneOS offers a compelling platform that aligns with your values and priorities.

In conclusion, the decision to switch to GrapheneOS represents more than just a change in operating systems—it’s a statement in favor of security, privacy, and digital freedom. As the threat landscape continues to evolve, embracing solutions like GrapheneOS is essential for safeguarding our digital future. So, why wait? Make the switch today and experience a mobile experience like never before—one that prioritizes your security, privacy, and peace of mind.

Written in part by ChatGPT.

A secure man, is a good man – did I hear GrapheneOS?

We need to talk. Especially if you have never heard of “GrapheneOS” before. Just spend a few minutes of your time reading this article – it might change your life. It did for me – the advices you will get here, that is.

In a world full of hackers, being state sponsored guys with all the money, access and time in the world, to the private bad guys that are up to no good trying to get your money or crypto cash, teens with skills and layed off people learning coding – you should put in some effort in securing your digital you a.s.a.p. And of course you should do the same for your family, should you be lucky to have them around. And besides hacking, the future threat of AI, God knows what that will bring when it comes to data, you should be extra careful in making your communication as encryptet and secure as possible.

This article will lead you from the darkness of the masses, and holding your hand while pointing in the right direction. Trust me.

The short story, and big spoiler alert: Let’s get you onto a Google Pixel cellphone where we install GrapheneOS, and from there, your privacy journey is already way into it’s race. Because, when thinking about this in retrospect, and all the stuff I have done and changed over the last three years, I realize it is a Pandora’s box of things to do. It will most likely seem a bit over whelming to begin with. But trust me – as you begin your privacy-focused new you, it will become second nature doing so. Step by step, you will secure your digital ‘you’ and as times passes by, you will see results on several arenas.

I will not cover the whole 2-do list, and how to fix all of the things you need to fix. To this, Google search and Youtube are packed with brilliant people, showing how to to it. I will however point you in the right direction, to some of the people I learnt a few tricks from.

The overall plan or strategy should contain some of the following items to do something about:

– Change main mobile phone number (which also means a new SIM card – yay!)
– Create a second mobile phone number for internet accounts/online shopping
– Get a good VPN-provider (like ProtonVPN)
– Get a password manager (like Bitwarden)
– Change main e-mail account
– Create multiple “burner” e-mail accounts
– Delete traces of old phone number og e-mails etc
– Replace all active accounts with new phone number (only where needed)
– Replace all active accounts with new burner e-mail address
– Remove personal identificators on online accounts where possible
– Selfhost services like “iCloud” and other services
– Get a mobile hotspot and get into the habbit of being in Flight-Modus
– Get familiar with Linux, Raspberry PI and the world of self-hosting
– Setup Matrix (encryptet chat service) for you and your family

And so on. But like I said, in this article I focus especially on your cellphone – your digital hearth – being brought with you when you where ever you go. Aother spoiler alert: you need to get rid of your Apple, Samsung or whatever cellphone you got, and run to your local store to pick up a Google Pixel cellphone – we are going into the world of GrapheneOS. But I can promisse you that your new Google Pixel phone will work really nice, and you will probably like my self be thrilled over new features that lies ahead, should you join the rebels of the GrapheneOS society.

Thanks to Edward Snowden, I learnt about this operating system some years ago on Reddit. I turned around, showed my long lasting hero Steve Jobs my back, and went all-in with GrapheneOS. No regrets but tons of frustration on the way to eternal happiness.

Starting off – if no changes has been made with regards to things like your main cellphone number, your main e-mail and so forth, you are getting off a bit skewed when it comes to privacy. In order to get the transition to GrapheneOS as good as possible, you should check of this article that focuses on a couple of key indicators on your digital you, before setting up the new phone. Have this done, you should continue with the actual phone. The mention article describes some potential strategies you might follow to take control over your data-sharing from now on. It is actually important.

Having your brand new, or a 2nd hand Google Pixel phone that the GrapheneOS-team still supports at hand, the journey begins!

Initial setup and strategies

After figuring out the setup, and getting the Google Pixel deGooglified, and GrapheneOS working as it should, the app-journey begins. The actual de-Googleification and setup of GrapheneOS is brilliantly described on the GrapheneOS pages – check them out. I assume you made it and are now inside the new frontpage of your new phone.

And now you need to make some decisions: have seperate use-accounts for social media, other non-daily apps and so forth. I drew up a map on a piece of paper, and dug into it. First I downloaded the F-Droid app store. From here I downloaded the Aurora app store which is the main station for apps on the GrapheneOS mobil. Of course you can activate Google’s app store and have a blast, but the whole point was to try to disconnect from those eco-systems as much as possible.

With Aurora store up and running, I started with Proton VPN.

FindMyWho?

Yes, your mobile life at you know it, will change. Being an old Apple fanboy, the change(es) where massive to begin with. But I kept my faith, and dug into each app that needed to be replaced. My first, and main worry? Find my iPhone. It had been my rock for many years, keep track of my kids as they went to and from school, playing with frieds and what have you. Suddenly loosing track of them and all our digital devices, was the first and major blow. But as always, when in doubt – call a friend! So I did and found a great solution to the old tracking-problem: Off course – self-hosting Home Assistant with a Raspberry PI. A new Pandora’s box unveiled. Suddenly I ended up with several projects at the same time. But they all had the same direction, and bit by bit, I got as close to the old Apple eco-system I got with my new Google Pixel 6. Owntracks proved to be the tracker I needed, and with all units established via Home Assistant, I got my pulse back to normal, and started to trust the system. Home Assistant is such an easy and great upgrade for anyone of you out there, so I will make several seperate articles on that beauty.

To be continued…