Quoted for truth. The only thing that will (potentially) slow down or stop an attacker with physical access is whole-volume encryption which requires a key to be entered at system startup (always, not ...