Get Charged, Stay Secure

Gadgets, apps, and info for road warriors

By Leslie Steere


May/June 2018

Cooking Light

Fire up a handful of twigs or sticks in the BioLite CampStove 2, and generate power for its USB outlet while your meal cooks. The CampStove 2’s fan creates a smokeless fire that can cook meals in minutes while turning heat into electricity for charging your devices. Weighing in at only 2.06 pounds, the stove is light enough to add to your backpack load. US$129.95. BioLite Energy

Recharge Anywhere

Planning a back-country adventure? Keep your devices charged with the rugged, high-capacity FosPower PowerActive 10200mAh power bank (2.1 A power output). Perfect for smartphones, tablets, and portable electronic devices, this power bank is designed to be not only waterproof but also snow-, dirt-, and drop-proof, and it sports built-in protection against short-circuiting, overcharging, and overheating. It comes with an LED flashlight, a compass, and a carabiner. US$25.99. FosPower

Travels with Tech

Surprise? Passengers prefer tech over human assistance.

From ticket purchase to baggage tags to security controls, travelers seem to prefer tech solutions over face-to-face interaction. A 2017 global survey found that passenger satisfaction not only tracked higher overall for tech users compared with those transacting with humans but that passengers increasingly are open to additional technology tools for travel. Among the findings:


Source: 2017 Air Transport Industry Insights: The Passenger IT Trends Survey

Do you speak tech? Quiz yourself!

  1. In the context of security, COPE means

    A. Compromised operation prevents execution

    B. Corporate-owned, personally enabled

    C. Cancel operation per executive

  2. Which of the following refers to lighter, purpose-built protocols that allow the things in IoT to communicate and interchange?

    A. Chirps

    B. Thingiots

    C. IoTics

  3. A trust boundary is

    A. The changeable security boundary between companies engaged in co-opetition

    B. The separation of different application or system domains in which different levels of trust are required

    C. An 8-foot-high cubicle wall between developers working on competing projects

Answers: 1. B; 2. A; 3. B

Apps: Secure Devices and Data—and Yourself

Locate your missing devices, access websites securely, and keep your travels safe.



Locate your laptop, smartphone, or tablet with Prey, an app that not only uses GPS to track your device but also lets you watch what is happening on screen and remotely lock the missing device to prevent data theft. You can use your missing device’s camera to take silent snaps and discover who is holding the item, set security zones to receive alerts when your device enters or leaves the zones, remotely wipe sensitive data, and more. Free (Android, iOS)

Hotspot Shield VPN Proxy

six with us

Access websites and apps securely and privately around the globe with the Hotspot Shield virtual private network (VPN) proxy. Hotspot Shield’s wide coverage includes 17 countries, enabling you to access sites that some regions may have blocked, such as Facebook and Google. Your information is completely private, and connecting to a VPN requires only a single tap. The proxy allows users to stay anonymous and prevents anyone from tracking their IP address, identity, and location from websites and online trackers. Free (Android, iOS)



Avoid travel troubles with Geosure, a location-sensitive personal security app that provides a safety score reflecting health risks, political uprisings, and environmental threats and gives crowd-sourced information about thefts and assaults that have occurred in your destination. Powered by an analytical engine that combines hundreds of information sources including those from the CDC, WHO, the United Nations, the US State Department, INTERPOL, and local authorities, the app lets you gauge your level of safety anywhere in the world. Free (Android, iOS)

Photography by BioLite, FosPower, and Andrew Pons, Unsplash