theres still audio and keyboard timing attacks. going to try playing randomly generated keyboard noises to turn on while typing and see if this can fool a directional mic. if so, that should cover cellphones mics and the like, but not for example a bugged hotel room.
we would need qubes on a small device you can slide fingers around quietly. personally, i find it easy to use my phone under my t-shirt or blanket (in a hotel room) or just covering half the screen with fingers. only did a couple times because i dont believe anyones after, or that ive ever been in a bugged hotel room. but, i know its a known issue in china. if that tablet liberm is selling runs qubes, problem solved :)
i think for most of us, the most sensitive thing we type is the login passphrase, and the disk encryption passphras(es) when booting (two if you also use on disk fde) so, there should be little exposure to begin with, especially if you change the login password often enough.
has anyone here experimented with bluetooth locks? it seems like a lot of extra scary code to run in dom0, but i like the idea of auto shutdown if device loses range. or maybe after a timeout period of some trigger?thats another discussion.
the same methods of video (and audio) analysis would still apply.
this isnt much hassle unless you do sensitive work in public places. otherwise, you only need the lid down long enough to type your screen saver password.