Background
I live in a high-risk region where phones and laptops can be seized and searched (often warrantless) by police, border control, or during administrative detention. There are credible reports of government-linked attacks that compromise Google accounts. Threat model includes:
-
Physical seizure of all devices
-
Coerced unlock (Phone PIN forced disclosure), or administrative detention

-
Remote compromise
-
No trusted individuals (secrets can be extracted under pressure)
Current Setup
-
Pixel 8 Pro (PIN + fingerprint only) – with Bitwarden logged in (biometrics-protected)
-
Fedora Silverblue laptop – LUKS2 full-disk encryption + Bitwarden logged in (PIN-protected)
-
Two YubiKeys (5C NFC + 5 NFC):
-
OATH protected by password
-
FIDO2 with PIN + always_uv enabled
-
-
Multiple LUKS2-encrypted USB data drives
-
All important 2FA (TOTP + passkeys) registered only on YubiKeys → To prevent account be stolen due to phone or laptop compromised
-
GitHub GPG signing key stored on YubiKeys; private key GPG-encrypted and backed up
-
Anonymous Proton Drive (accessed only via Tails) contains:
-
Bitwarden encrypted JSON export (gpg -c further encrypted)
-
TOTP seeds / recovery codes (gpg -c encrypted)
-
GPG private key export (gpg -c encrypted)
-
Current Practices
-
Laptop LUKS2 unlocked via FIDO2 (systemd-cryptenroll)
-
Data USBs use passphrase only (not FIDO2) due to USB-C slot conflict — don’t want to carry/use hub constantly
-
All proton drive backups done exclusively in Tails
Questions
-
Should I store LUKS2 passphrases in Bitwarden?
Thinking of storing LUKS2 passphrases in Bitwarden (ask about both laptop and data USBs). Concern: If authorities get full phone access → they get Bitwarden → they get LUKS2 passphrases → physical seizure of USBs gives them full data. Alternative (FIDO2 on data USBs) is impractical due to slot conflict. Better approach under physical + compelled-unlock threat? -
AWS remote server (Paperless-ng in Docker) authentication
How to best secure Linux login on this server? Storing root/user passwords in Bitwarden feels risky if phone/Bitwarden is compromised. Better options? -
Phone is still the weak point despite YubiKey 2FA
Even with strong YubiKey-only 2FA, phone compromise breaks many accounts:-
Discord QR login bypasses 2FA
-
Google auto-creates non-removable device-bound passkey on Android If government gets unlocked phone, they can access services directly.
Any realistic way to protect accounts even if phone is fully compromised/unlocked?
-
-
Stronger emergency recovery when all physical devices are confiscated
Current backup (GPG-encrypted files on anonymous Proton Drive via Tails) is still vulnerable. All hardware (YubiKeys, phone, laptop, USBs) can be taken at once → any recovery needing live 2FA/hardware at that moment is impossible. What are better strategies for getting back in when everything physical is gone? Willing to accept trade-offs (convenience, extra steps, etc.).
Final note
I understand nothing is 100% perfect in this threat model. If you have suggestions that involve limitations, sacrifices, or aren’t ideal but still meaningfully improve things — please share them. I will carefully consider every thoughtful reply. If you have better ideas (out of the questions) to enhance the security, please also feel free to share.
Thank you for any help.