Newer Intel processors have lowjack functionality built right into them :/. Carrying your laptop with you everywhere you go is definitely great for security, but it does get to be a bit cumbersome. I did that for quite a while, but it is truly hard to keep it up. I believe that even if you carry your laptop with you everywhere, that if you are identified and they want you bad enough they will be able to get you. They might sneak into your home when you are gone and install pinhole cameras to spy on you typing your password in. Or they will install mini microphones and get your password by analyzing the amount of time between keystrokes, and the number of keystrokes you type before waiting for your OS to boot up the rest of the way. Or they will do some crazy TEMPEST style attack. Or they will just rush in and pwn your ass before you have time to power down. Carrying your laptop with you everywhere but only using it inside of your sound proofed tinfoil covered blanket fort loses its appeal at a surprisingly rapid rate. But it is more secure . IMO nobody should really rely on full disk encryption to keep them protected from a targeted attack. It can certainly save the day, but the cases where it saves the day tend to be when the attacker is street level LE, or feds who are not aware that you are using encryption in the first place. I know someone who was arrested for drug trafficking not related to the internet, he also was a member on several private drug forums and quite involved with the online scene. The police and DEA agents that raided him did confiscate his computers and try to look through them, but they just immediately powered them down and since they were encrypted couldn't get shit off of them later. They had no idea that he would have encrypted hard drives, and they just don't have the resources to do raids with a focus on computer forensics in every single case, on the off chance that someone they raid might be using computer security techniques to hide something interesting from them. In the literature on CP raids you can see much of the same theme, it is quite common for an encrypted hard drive to protect someone who has been raided on suspicion of downloading CP from some public P2P network or something, but it is also pretty frequent that the feds will do a cold boot attack or similar in order to defeat disk encryption when they do targeted operations against big time collectors / distributors who are part of targeted and known as sophisticated trading groups.