This is the third and final post in a 3-part mini series on risky smartphone travel. Posts in this series Part 1— risks, threat actor capability, smartphone choice, VPNs, encrypted DNS, smartphone configuration Part 2 — contacts/accounts, the high risk travel itself, traveller preparation, mobile data -v- Wi-Fi, roaming, and monitoring Part 3 —…