Encrypt your laptop — the whys and hows

The Intercept: Encrypting Your Laptop Like You Mean It »