In Linux, what encryption implementation approach is optimal given specific use & threat models?

Given the following use & threat models, what is the optimal encryption implementation? Optimal is defined as the approach best matching the use model.
Use Model

Computer must be optimized for performance.
Computer use will include s… Continue reading In Linux, what encryption implementation approach is optimal given specific use & threat models?