Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
Before traveling, delete all sensitive data from your phone. That data should be backed up online.

Then you take 50 pics of your penis and put your favorite as a wallpaper. Goons from TSA will love it. Add a giant dildo inside your bag. Even they check it, scream homophobic po-leece!
 
How long could the TSA hold you for?
If you're a US citizen, not very long - a couple of hours - but they can keep the phone longer. If you're not a citizen, they they can make you return home.

One way to keep them out is to enter your iOS passcode wrong 9 times. If they ask for the code, give them the wrong number and the device gets erased if you have that feature on.
 
How long could the TSA hold you for?
Pre 9/11 a Japanese friend of mine got 'questioned' by US customs for 4h because she seemed suspicious as she was flying from China to the US (simple 'logic' she must have a fake Japanese Passport as she travels from China). Nowadays I am pretty sure you can be detained even longer especially if you are non-cooperative.
 
You don't ever own the software, even when you "buy" it.
I know that. I"m talking about permanent licenses VS licenses that stop working if you stop paying the rent one month.
[doublepost=1495615113][/doublepost]
Is there some kind of process for determining who gets their phone inspected and/or copied?
Looking brown-ish or having travelled anywhere else than Disneyland will definitely qualify you.
 
I'm a US citizen. Are we talking days here?



If I turn my iPhone off, the TSA can't force me to unlock it right? I take my privacy very seriously and I'll fight tooth and nail to protect it as long as I'm not breaking the law.
The US practically abolished Habeas corpus under Obama.

So you're looking at - theoretically, depending on the reason you're being detained for - potentially indefinitely.

If they use the terrorism card you're SOL.

Glassed Silver:win
 
As lovely as this ideal sounds, if they find any indication that you use apps or sites that require passwords and you "don't know" your password, you better believe they'll have the patience to wait until you figure it out. While the premise is good, this will make your life hell more than it will protect you should they decide to dig deep.

We'll they'd be waiting forever because my passwords are over 20 random characters long. I never even see them and if I did no way would I remember them.
 
It's great 1Password are doing this but the bigger issue is once the TSA are in your phone, they can see your photos, notes, look through all the apps youre logged into, your social media, Facebook, etc.
 
I've used 1Password for iOS and MacOS for years and followed the introduction of the subscription pricing. I recall at the time that 1Password said that outright purchase would still be possible (the option was buried away so people went the subscription route). If it is still able to be purchased outright, then Macrumors should explain why that purchase option was not mentioned in this article since the omission makes this article read more like a press release than independent journalism.
 
Hmm... I never make temporary passwords for traveling. Not sure I understand the feature. ELI5 pls?

This doesn't create temporary passwords. It removes vaults (not hide) them from 1Password. So I have a vault here for work that contains sensitive information related to being able to build 1Password for Mac and iOS. Think code signing certificates and things like that.

If I'm crossing the border this information is not mine to give. It's AgileBits' data. I can't legally give it to anyone since I don't own it. I simply have permission from AgileBits to have this information to do my job.

AgileBits would rather not risk having this data compromised because I get stopped at the border (doesn't matter which border, just any border, by any type of security). So they limit my account so that when I'm traveling I do not have this data available to me, therefore I cannot give it.

My personal data will remain on the device, if I so choose. What I travel with me is up to me to decide. I could just delete the app from my account but if they know I have an account somewhere they're going to ask me to provide the login information (potentially). I can't give what I don't have. The same is true with travel mode. I don't have it, so I can't give it.

Bummer, 1Password.com only.

The alternative here is you delete the app or vaults. There's no way to "automate" this process really with standalone vaults. So you have to do it yourself. There are certain things having a centralized server can allow us to do, this is one of them. It's making the process easier because our server has control over this type of thing.

Sorry though. As I said you can replicate it by deleting sensitive vaults or the app entirely. Then when you get to your destination re-adding those vaults.

Ok, so it's only to hide passwords from the TSA?

It's not hiding passwords. It's making them unavailable entirely. When travel mode is enabled the vaults no longer exist on your devices. It's not as though the vaults are just hidden and the data is still there in the app, it's literally removed from the app until Travel Mode is disabled.

I like the idea. Kudos to 1Password for continuing to make the app the best it can be.

Thanks! It's little features like this that make us happy as well. We seen a need for this a few weeks ago and got to work on trying to make it reality. And I suspect this is only an initial release, there have been a few ideas floated around about how we can make this better yet.

Sounds like it removes all vault data from all your devices (except the vaults you flag as required/safe) before you travel in case any of the devices get lost or stolen en route. Once at your destination, if you needs your vaults back, you can disable the travel mode and all your vaults are restored.

I suppose because 1Password stores a local copy of your vault on each device, this gives people piece of mind that, if they use the feature and a device is lost/stolen, there is no longer any password data on the device that can be retrieved or accessed.

Edit - also what OldSchoolMacGuy said, there's a lot more security when travelling across borders these days.

It's not just lost or stolen. See my example above. I have sensitive work data related to my job at AgileBits. Data that I simply do not have the permission to give someone else. By making that information not available on my devices I can no longer give that data away either on purpose or by accident.

What people choose to do with this and their own data is another matter. You have to decide that. I suspect in my case I'll be moving the more sensitive data I have to a separate vault that is not safe for travel. I don't really care if someone looks at my Facebook or Twitter or whatever. I can just as easily change my passwords to those. But under no circumstances should anyone see my SSH, GPG, or code signing certificates. As you can imagine, having a government who has access to those types of security bits is an ugly concern.

Hmm, but even if I lose my iPhone isn't my data safe? It's protected isn't it?

This is a highly loaded question.

Do you use a really strong passcode for your device password? If you use the 6 digit PIN that's set by default on Apple devices, no, that's not all that safe. Switching it to a alphanumeric passcode and using something longer is a much more secure option. This will help protect your data that isn't password protected on your phone.

In terms of 1Password. Is your Master Password strong? Also is it unique from your device passcode? They shouldn't be the same, otherwise if someone gets the one they have the other. If you're using a strong unique master password for 1Password, you're in good shape for your 1Password data.

But at a border you could be compelled to provide certain data, if you're arrested you could be required to provide information. Information such as your Master Password or finger print. I'm not a lawyer, so if you have serious concerns about this, I suggest talking to one, anyone here who isn't a lawyer and provides you advice here, expect it to potentially be incorrect. I'm not going to try to provide you advice on that because I know full well I don't know the full extent of this, and it likely varies country to country.

Looks like Agile Bits is about to move to an Adobe-like rent-only option for their software. So sad.

Our licenses are available here. And our Android and iOS apps allow purchase of our "Pro" features which are the advanced standalone features we've had as options for a couple years now. You can check our In-App Purchase options for both the Mac App Store and the App Store to see that those options are also still present there.

As lovely as this ideal sounds, if they find any indication that you use apps or sites that require passwords and you "don't know" your password, you better believe they'll have the patience to wait until you figure it out. While the premise is good, this will make your life hell more than it will protect you should they decide to dig deep.

I am not a lawyer, but you still can't provide that which you don't have.

This feature isn't really about Facebook logins and Twitter accounts. Unless those Facebook or Twitter accounts are extremely important to you. It's about access that no government should have.

In my particular instance I carry with me a lot of sensitive information for work, I work for a security company after all. Before when traveling I'd have to remove a lot of data from my devices. Then be creative in how I could restore that data when I got to my destination. Most of that data isn't my Facebook or Twitter, I don't particularly care if someone has access to those, but I do care very much if they have access to my work related information. That information is not mine to give. So removing it from my device is the only option and it's something AgileBits decides for me. Our admins determine which vaults disappear in Travel Mode.

I suspect in the end we'll end up making it so that only our admins can restore access as well. This means I can't be compelled to give access that I can't grant to myself. Again, it's not mine to give.

This is obviously very work oriented but a case can be made for doing the same in a family setup where one family member has the ability to restore and the other does not. These are all ideas and potential changes we make in the future. But we're only giving someone the OPTION to do this, if you feel it won't work for you then you don't have to use it. Travel Mode is something that has to be explicitly enabled, so each user has the choice on whether they want to use it, though if you have 1Password through an employer, they may require you enable it for your work data.

Surely if the TSA are going to go to the trouble of looking at your vaults in 1Password, they're also going to check if you've got the 'travel mode' switch turned on?

There's no way to see that Travel Mode is enabled in the apps.
 
  • Like
Reactions: TimSHB
The alternative here is you delete the app or vaults. There's no way to "automate" this process really with standalone vaults. So you have to do it yourself. There are certain things having a centralized server can allow us to do, this is one of them. It's making the process easier because our server has control over this type of thing.

Sorry though. As I said you can replicate it by deleting sensitive vaults or the app entirely. Then when you get to your destination re-adding those vaults.
You don't say?
 
It's great 1Password are doing this but the bigger issue is once the TSA are in your phone, they can see your photos, notes, look through all the apps youre logged into, your social media, Facebook, etc.

Protecting your data is becoming more and more vital. I would recommend looking at Basecamp's handbook for what they require employees to do when they travel. This is more business related, but it's the thing that got us making Travel Mode. You can probably adapt some of that to your own personal data and give you some ideas on how you can keep yourself safer.

I've used 1Password for iOS and MacOS for years and followed the introduction of the subscription pricing. I recall at the time that 1Password said that outright purchase would still be possible (the option was buried away so people went the subscription route). If it is still able to be purchased outright, then Macrumors should explain why that purchase option was not mentioned in this article since the omission makes this article read more like a press release than independent journalism.

First, our licenses are still available for purchase here.

I can't speak for MacRumors, but I suspect because our own site doesn't mention the licenses they don't mention them. And in our eyes that's perfectly fine and exactly what we want.

Right now a vast majority of people who are viewing the sign up pages are new customers and overwhelmingly the best option for new customers is the subscription option. For those that it isn't we still offer the licenses.

We'll have to see how we can handle this when any future upgrade for the standalone license version is available, it'll certainly make things difficult to explain again, which is why we removed the licenses from the pricing page. It was just too confusing and no matter how we changed things it was never good enough and caused a great deal of pre-sale customer support.

So I suspect if you want to blame anyone for the lack of licenses being mentioned in this article it should be placed on us, not MacRumors.
 
I love 1password...don't like the subscriptions...(but still have a family one. )

Seems like a great feature and isn't something I ever considered or thought that I would need.
Good on you guys for making it!
 
  • Like
Reactions: AGKyle
It's great 1Password are doing this but the bigger issue is once the TSA are in your phone, they can see your photos, notes, look through all the apps youre logged into, your social media, Facebook, etc.
It's worse: Once the phone is unlocked, they can connect it to a forensic device and make a copy of most data within minutes (including some data that you have deleted), unless you install a configuration profile that prohibits iTunes pairing. It's also a good idea to enable encrypted iTunes backup, so they can't pull an open backup from the phone.

A password database is really the smallest problem, assuming it's properly encrypted and they can't force you to reveal the master password.
 
Article correction/clarification:
Although they de-emphasize it, AgileBits still sells the app as a standalone solution, i.e. you don't need a subscription. I just confirmed this with AgileBits and can post the email if asked.

They claim that they don't recommend it because it's a "much more technical" solution than their subscription service. My take? Baloney. It's simple to sync via iCloud or Dropbox, which they're actively developing, and I don't care if my data is encrypted locally vs on their servers (I actually prefer the former). They tout that the app is "free" with a subscription. Fine, but at $3/month, you're buying the equivalent of the 1P app every year, and syncing is crippled if your subscription lapses.

No thanks. I just hope they continue to support the standalone app with 3rd party syncing (2nd party in the case of iCloud). We'll see but I sense the sunset coming. They're really pushing hard for people to "upgrade" to the subscription-based hosted service.
 
Last edited:
I've used 1Password for iOS and MacOS for years and followed the introduction of the subscription pricing. I recall at the time that 1Password said that outright purchase would still be possible (the option was buried away so people went the subscription route). If it is still able to be purchased outright, then Macrumors should explain why that purchase option was not mentioned in this article since the omission makes this article read more like a press release than independent journalism.
It more than likely was a press release. If you look at all the 1Password reports on Macrumors you will see that AgileBytes does have a most favorable slant. Its almost like Macrumors gets advertising revenue and unlike normal newspapers there is no separation wall between advertising dept and editorial dept.
 
My original post was made partially in jest. But legally speaking, US citizens usually cannot be detained for more than a few hours, but YMMV. As an example, there was a NASA employee (entering from a foreign country) who was apparently told by US Customs & Border Patrol agents that he could be detained indefinitely until he gives up the password for his (government issued) phone - https://www.washingtonpost.com/news...-smartphone-passcodes/?utm_term=.80f51a40b1c5. In this case, it seems like the man was held for over an hour. The author of the article concluded that there's not enough case law to more easily answer similar questions.

In a different circumstance but with similar, uncertain legal precedent, there is also an ongoing case of a person who has been indefinitely detained (for over a year as of writing) for not providing the password to his computer - https://arstechnica.com/tech-policy...d-16-months-for-refusing-to-reveal-passwords/

So this is the reason for my first post (as far as for both of your questions go) - if you are detained, you'd have to hope you have a good lawyer available.

What if I have travel mode on in 1password and I don't have access to the passwords? What happens then? What happens if someone breaks their phone on the spot? It would certainly be cheaper than hiring a lawyer.
 
It more than likely was a press release. If you look at all the 1Password reports on Macrumors you will see that AgileBytes does have a most favorable slant. Its almost like Macrumors gets advertising revenue and unlike normal newspapers there is no separation wall between advertising dept and editorial dept.

For what it's worth we do sometimes release press release information to other sites. I don't know if we did for this particular feature to be honest. If you'd like to know for sure I can ask our media team.

That said, we do not pay for reviews or coverage. As far as I know MacRumors chooses what to publish on their site. It's possible they are on a list that our media team uses to send out press releases, but that's just so they get those releases, nothing more.

I like to think we get favorable coverage because we're a popular app, and we're popular because 1Password works for a large number of people. MacRumors knows that popular apps interest their viewers as it's likely more of them use it. Therefore it's probably good for MacRumors to publish things about those popular apps as it gets more views. But nothing we do impacts how favorable their review is, what they publish on that side is entirely their decision.

In fact, I'm fairly confident one of their staff has been fairly outspoken against 1Password lately and speaks his/her mind here on the forums.
 
  • Like
Reactions: Primejimbo
A password database is really the smallest problem, assuming it's properly encrypted and they can't force you to reveal the master password.

I am not a lawyer but it was my understanding that they can force you, or at least hold you until you do.
If they 'suspect' that you are involved in terrorist activities then they pretty much have carte blanche to whatever the hell they want. Especially if you are not an American citizen.
(I put suspect in quotes as I believe the law allows them a large leeway in their definition..I certainly wouldn't want to be on the wrong side of them.)

If this helps relieve a potential problem for people then it is a great thing to have.

Their move to a subscription service has received a lot of flak (myself included) but the software is top notch.
Kyle and Ben (I think) try hard to help people on the forums, and it is good to see they are continuing to develop their product.
 
What if I have travel mode on in 1password and I don't have access to the passwords? What happens then? What happens if someone breaks their phone on the spot? It would certainly be cheaper than hiring a lawyer.

Cheaper as opposed to hiring a lawyer? Perhaps, but I'm not so sure that a lawyer would ever advise you to do that in front of LE. And once again, YMMV as far as the other questions go.
 
A little unrelated; but I wish Apple would add some kind of 'guest mode' for travelling.

For example, somewhere in settings you have a secondary passcode, and the ability to determine which apps show on the home screen when that one is entered.

Perhaps even with settings to delete the 'proper' profile entirely when that code is entered.

Would be useful in a situation where anybody demanded your code, enabling you to give it without giving anything.
 
I love 1Password, but would never use the subscription model. I've been using the software for years, so paying monthly would have been much, much more expensive. So since it looks like this feature is for subscribers only I can't really make use of it. But honestly I don't understand why you would need it. Making the decision for every entry in my database which passwords are "travel safe" sounds pretty complicated.

It is easier to just delete the app before you cross the border and reinstall it afterwards. The vault can be downloaded from iCloud within seconds and everything is back to normal. Sounds like a much simpler and cheaper solution for me.

You should also always enable the iTunes backup encryption (with a complex password) because even when your data gets pulled from your phone at the border, it would be encrypted.
 
But honestly I don't understand why you would need it. Making the decision for every entry in my database which passwords are "travel safe" sounds pretty complicated.

It is easier to just delete the app before you cross the border and reinstall it afterwards. The vault can be downloaded from iCloud within seconds and everything is back to normal. Sounds like a much simpler and cheaper solution for me.

You should also always enable the iTunes backup encryption (with a complex password) because even when your data gets pulled from your phone at the border, it would be encrypted.

First, you don't decided on a per item basis. You mark vaults specifically as travel safe. So I have a few vaults here:

* Personal
* Work
* Archive
* Test Items
* Kyle's House
* Brother1's House
* Brother2's House
* Mom & Dad's House
* Travel

I mark only the Travel vault as safe for travel. It includes things like my Passport, login items that are specific for travel (airline Logins, hotel Logins, a copy of my itinerary as a Document, etc)

It's very easy for me to know what is important when traveling, so those items get moved to that specific vault.

For my AgileBits account nothing is marked as safe for travel as far as I am aware, which is exactly how I want it.

The nice thing about Travel Mode in the 1Password.com Accounts is that simply disabling Travel Mode is all that's necessary and all the vaults re-appear. And while we're aware of a couple bugs, notably one that causes the default vault for saving to be lost, which we do plan to fix, the goal is that the app doesn't need to be setup again and all your preferences reset (vault settings, sync, security preferences, iOS extension settings, vault order, etc). There may be other features added in the future as well that will start to differentiate things.

You're correct though in that you could just remove the app and you'd have the "same" type of feature. It's not quite the same, I find that far less pleasant to use, mostly because I had done various versions of that when traveling in the past and found it frustrating. I have a lot of vaults (the set above is a small subset of my total vaults). Adding all of these vaults back in 1 by 1 is painful at best. If you only have one vault, perhaps it's easy enough.

Good call on the encrypted backup though. That's one thing I can totally agree with you on.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.