In Linux, what encryption implementation approach is optimal given specific use & threat models?

Given the following use & threat models, what is the optimal encryption implementation? Optimal is defined as the approach best matching the use model.
Use Model

Computer must be optimized for performance.
Computer use will include s… Continue reading In Linux, what encryption implementation approach is optimal given specific use & threat models?

How can we confirm with certanty a USB or Harddrive is not infected after reformatting?

Running the following code on a linux machine returns the partition tables and partial config of the hard-drive and USB devices.
fdisk -l

returns
Disk /dev/nvme0n1: 238.47 GiB, 256060514304 bytes, 500118192 sectors
Disk model: PC300 NVMe… Continue reading How can we confirm with certanty a USB or Harddrive is not infected after reformatting?

How to encrypt a disk with 2 Windows OSes and 3 partitions with Vera Crypt? [migrated]

I have a disk with an MBR partition scheme and 3 partitions. On the first partition, there’s a Windows 7 C: drive which I keep to play some retro games that won’t run on newer Windows. The second partition is a Windows 7 D: partition. It’s… Continue reading How to encrypt a disk with 2 Windows OSes and 3 partitions with Vera Crypt? [migrated]