Qube Encryption

You can use it How to create an encrypted secondary storage to lock/encrypt individual qubes

You can use encrypted volumes such as ZuluCrypt, VeraCrypt, and Cryptomator to store personal data in appVMs. I have a separate qube super‑vault that contains my ZuluCrypt volumes, and I use Cryptomator in some appVMs. For extra protection you can use buskill or USB Kill Switch for Qubes OS - Physical Security Enhancement.

You can used this solutions to defend against forensic analysis:
dom0 ZRAM Live Mode
dom0 OverlayFS Live Mode
I work only in RAM mode in varlibqubes, but my storage is located in the vm‑pool, so data saved in the encrypted volumes remains after a reboot, while all sessions and processes in varlibqubes are destroyed.

2 Likes