@noncetonic: That setup is pretty interesting. For pentests and red teaming I used to have two different laptops. One was my home computer which was secured with a fingerprint scanner (not shitty windows fp scanner but a real scanner hooked to it via USB which cost me a few hundred bucks) and a pass phrase, as well as LUKS and the usual. My pentest machine was sort of the same thing but no fp scanner, just killallthehumans (github is your friend if you don't know), which separated the shadow file from the actual system, making it impossible to use without a USB drive which contained a GPG encrypted shadow copy.
I also had a passphrase of 7 words, and Prey anti-theft. Prey was basically the only way to track my setup since I was using Tor for everything, and spoofing my mac, and so no one but NSA could do much in the way of tracing MAC or whatever. This was to make my computer a stealthy pentest machine. Not to mention, when I had free time, I recompiled SSH etc. when allowed, so anybody who was nmapping my shit wouldn't find anything but the name, not the version. There was also a secure anti-fingerprint software I ran that killed any trace of history, logs included, that I defined in a userdb.task file.
I used this setup until a few years ago when my house was broken into and they stole everything.. the laptop was probably DBAN'd and the fp scanner sold on eBay. I found some of my old hardware on random craigslist ads and shit. Was a hard thing to see.