This is why security protocols are to have blank devices for all traveling. Companies also use encryption that the person with the device don't have access to. If they don't get to the destination without the device being unmolested by any agency, they don't send the credentials, they send a new device.
This is why security protocols are to have blank devices for all traveling. Companies also use encryption that the person with the device don't have access to. If they don't get to the destination without the device being unmolested by any agency, they don't send the credentials, they send a new device.