How to protect files in use on a system powered on from physical theft or tampering?

I’m in the process of figuring out an encryption strategy for a personal Linux system.
My laptop is almost always on, or in sleep mode, except for longer travels.
My main threats are theft of my laptop while powered on, and evil maid.
It i… Continue reading How to protect files in use on a system powered on from physical theft or tampering?

Shred, cut, melt, smash, grind, then flush, is it secure disposal of a security access id card?

I had a card like a credit card that I used to use for work. It was an ID card, and it had an access code, a swiper, a barcode, my picture, my name, my rank, my license, the name of the company, and the address of the building where my com… Continue reading Shred, cut, melt, smash, grind, then flush, is it secure disposal of a security access id card?

Need expert help regarding a long term targeted attack,mount infected partition safetly and other security questions [Thinkpad T450] [closed]

I’ve got a t450 thinkpad and am under a targeted attack most likely by physical contact with my device (shared house).
I need to format all my partitions but first preferably mount them on a chrooted session to copy some desirable files, s… Continue reading Need expert help regarding a long term targeted attack,mount infected partition safetly and other security questions [Thinkpad T450] [closed]