🛡 Qubes OS live mode. dom0 in RAM. Non-persistent Boot. RAM-Wipe. Protection against forensics. Tails mode. Hardening dom0. Root read‑only. Paranoid Security. Ephemeral Encryption

By the way, I recommend using Kicksecure and Whonix appVMs for ephemeral encryption of a private volume with /rw isolation. I also recommend reviewing this guide before using mine guide Anonymize hostname hardened template automatic installation of browser