Great stuff in the UNO TECH link in your signature BitcoinNational. I'm satisfied about how much of that I've already figured out and implemented piece by piece on my own previously. There are a few things though that I'd like to have clarified.
1) Say you make 5 addresses and send funds to them, then place the encrypted backup on an encrypted USB in the secondary location. Then I make five new addresses and send funds to them. Does the secondary backup still access the original 5 addresses? I'm not sure if adding new addresses invalidates the entire old private key, or if we're warned about that just because the newest addresses wouldn't be backed up. Say if the first 5 addresses contain 1,000 uno but the next 5 contain only 10 UNO, then I won't fuss about it as long as the original 5 are still covered. I suppose it shouldn't matter, I should just make 50 new addresses, label them then I can leave the secondary backup for years and not have to worry about it.
If you have 1000 coins in an address in Unobtanium-qt/unobtaniumd and you send 1 coin, the change will typically NOT be returned to the previous address (unless you specify it with the coin control features). It might be best to create two wallet.dat files, one with most of your funds that you don't plan on spending from and another wallet.dat for daily spending with a small amount. You could even split up your "stash" wallet into addresses that hold, let's say, 1/10th of your stash. Each time your spending wallet runs out just "importprivkey" one of those address private keys to refill your hot wallet.
2) In regards to keyloggers. I've gotten a bit paranoid that you can never really know if you're free of keyloggers. I went to the extent of placing a basic Linux program on a USB drive to initialize my ledger wallets offline. Although I do use ESET NOD32, which it seems literally updates my virus signature about 10 times per day. I do visit sites cragv warned against, things you wouldn't tell your grandmother about or torrents or w.e. So my two questions here are: Should I be able to feel at least 98% confident that my computer is safe from keyloggers while using ESET NOD? I know I have never had any breaches from the 50+ websites I've logged into or wallets I've used in 15 months, but I'm sure that's not evidence to conclude I've never been infected. Even then I'm not happy with 98%, so am I able to create true offline wallets despite having only one laptop?
Probably, a
tails live cd, a copy of the paperwallet index.html file on a flash drive, and your disconnected laptop I think is a good recommendation.
3) Would downloading the html of the cryptap.us brainwallet program be an improvement in security despite my computer still being used online? Bonus stupid question: would it help at all (guard against keyloggers) simply to disconnect from the internet when using the program? Does Cryptapus prove that the website can not store which brain wallet phrases are typed in? (I know, people have told me he's trusted, just asking).
You certainly could download the brainwallet html, just don't forget to also grab the javascript files referenced in it. You will lose the "transactions" capability since you can't grab unspent transactions from a block explorer. It might be easier to just grab the paperwallet.html file since the brainwallet functionality is also built in and it's just the one file. Verifying that no keylogging is taking place can be done by examining the javascript. Not really an easier way to prove a negative in this case. But it's probably best to not trust anyone, myself included, with your money. The best advise is to examine the code in detail to prove to yourself that no monkey business is going on...