LUKS and strong passwords are staples in many users security tool-kits, and they’re excellent starts for the average security user. But, these simply aren’t adequate when faced with a potentially advanced adversary. Many tools and technologies exist that, when combined properly, can provide a very strong defense against these threats (spoiler alert: your encryption keys should never reside in ram). This talk will be an exploration of disk and file encryption utilities, demonstrations of reasons to lose sleep at night, and an analysis of a myriad of tools and concepts to help the paranoid security freak rest easy.