Advanced Security Setup – High-Risk Region

Background
I live in a high-risk region where phones and laptops can be seized and searched (often warrantless) by police, border control, or during administrative detention. There are credible reports of government-linked attacks that compromise Google accounts. Threat model includes:

  • Physical seizure of all devices

  • Coerced unlock (Phone PIN forced disclosure), or administrative detention :slight_smile:

  • Remote compromise

  • No trusted individuals (secrets can be extracted under pressure)

Current Setup

  • Pixel 8 Pro (PIN + fingerprint only) – with Bitwarden logged in (biometrics-protected)

  • Fedora Silverblue laptop – LUKS2 full-disk encryption + Bitwarden logged in (PIN-protected)

  • Two YubiKeys (5C NFC + 5 NFC):

    • OATH protected by password

    • FIDO2 with PIN + always_uv enabled

  • Multiple LUKS2-encrypted USB data drives

  • All important 2FA (TOTP + passkeys) registered only on YubiKeys → To prevent account be stolen due to phone or laptop compromised

  • GitHub GPG signing key stored on YubiKeys; private key GPG-encrypted and backed up

  • Anonymous Proton Drive (accessed only via Tails) contains:

    • Bitwarden encrypted JSON export (gpg -c further encrypted)

    • TOTP seeds / recovery codes (gpg -c encrypted)

    • GPG private key export (gpg -c encrypted)

Current Practices

  • Laptop LUKS2 unlocked via FIDO2 (systemd-cryptenroll)

  • Data USBs use passphrase only (not FIDO2) due to USB-C slot conflict — don’t want to carry/use hub constantly

  • All proton drive backups done exclusively in Tails

Questions

  1. Should I store LUKS2 passphrases in Bitwarden?
    Thinking of storing LUKS2 passphrases in Bitwarden (ask about both laptop and data USBs). Concern: If authorities get full phone access → they get Bitwarden → they get LUKS2 passphrases → physical seizure of USBs gives them full data. Alternative (FIDO2 on data USBs) is impractical due to slot conflict. Better approach under physical + compelled-unlock threat?

  2. AWS remote server (Paperless-ng in Docker) authentication
    How to best secure Linux login on this server? Storing root/user passwords in Bitwarden feels risky if phone/Bitwarden is compromised. Better options?

  3. Phone is still the weak point despite YubiKey 2FA
    Even with strong YubiKey-only 2FA, phone compromise breaks many accounts:

    • Discord QR login bypasses 2FA

    • Google auto-creates non-removable device-bound passkey on Android If government gets unlocked phone, they can access services directly.

    Any realistic way to protect accounts even if phone is fully compromised/unlocked?

  4. Stronger emergency recovery when all physical devices are confiscated
    Current backup (GPG-encrypted files on anonymous Proton Drive via Tails) is still vulnerable. All hardware (YubiKeys, phone, laptop, USBs) can be taken at once → any recovery needing live 2FA/hardware at that moment is impossible. What are better strategies for getting back in when everything physical is gone? Willing to accept trade-offs (convenience, extra steps, etc.).

Final note
I understand nothing is 100% perfect in this threat model. If you have suggestions that involve limitations, sacrifices, or aren’t ideal but still meaningfully improve things — please share them. I will carefully consider every thoughtful reply. If you have better ideas (out of the questions) to enhance the security, please also feel free to share.

Thank you for any help.

1 Like

For your high threat model I recommend checking out the OPSEC Bible

1 Like

No, keep it memorized in your head. I will get around to answering your other questions later when I have time.

Okay, I have carefully read through this topic, but the threat model is not scoped specific enough, so I will address some of them:

Within your immediate possession and/or proximity?

Of your devices? If so, why would your adversaries bother to coerce you or others for secrets and/or seize your devices to begin with?

This is a difficult situation if interpreted literally, because that means no secrets can be safely held other than on tamper-resistant smartcards. The only other counter-measure within your control is your own tolerance against such pressure. Despite the threat of personal coercion, my previous post in this topic still stands, because Bitwarden increases your attack surface by being another critical point of failure against coercion or remote compromise.

Usually body search immediately then a house search while I’m being detained.

Compromising devices and online accounts. Specifically, in HK/China, they monitor basically everything including chat records. I don’t want to leak anything to them, as this may give them opportunities to charge me.

I am annoyed by having so many passwords. I believe the silverblue LUKS password is generally safe, since no keylogger works before boot. But for others data USBs’ LUKS password, they are entered in OS, so could be logged. Therefore, I tried to make all the passwords different, but they are hard to be memorized.

Hmmm, from your post I see some threats and your setup, but I cannot see your perceived risk assessment, esp. likelihood of you being targeted by the regime, and whether you/ your closed ones / your community, etc. will be in trouble if the regime have access to those information.

Your current setup seems quite robust, but you ignored the fact that for most of the times, autocratic regimes don’t need to break the devices, they only need to break YOU.

Also, in many cases, autocratic regimes don’t really need any information from you to convict you.

So, if you only want to protect yourself, IMO this setup is basically irrelevant, i.e. overkill in some aspects, but does nothing in other aspects.