>>7 In the name of pure password strength, you'd be right, however this leaves a backdoor that I am wary of. Any breach in the security of the password's container compromises the password.
Simply, Your 1024 bit password of uncrackability then runs the risk of being copied or downloaded. Furthermore, it is also vulnerable to drive failure.
I like the idea of memorable, but hard to guess passwords, as they are only beaten by rubber hosing, in which case, you were screwed from the start.
As the US still tries to keep up appearances sometimes about the 5th ammendment, it seems safer to gamble against rubber hosing than against the simple finding of your removable media(yes, you can store decryption keys on usb keys, and it may make a great form of secondary authentication). Not only that, but the US legal system has also so far held physical keys to be unprotected by the 5th, but memorized passwords are.
Therefore, whether you prefer mental passwords or physical keys is user preference, but it definitely makes for a good combination.
Another useful foundation for privacy is to build upon a legal framework. By this I mean know your rights, so that you can deter over-zealous police, and know what won't work so well.(don't bother encrypting in the UK for example.)
Good starts include reading the constitution (of your home country, and of any country you plan to visit.), as well as looking up videos, laws, and cases which seem relevant to any measures and situations that you think could be relevant.
Flex your rights has great videos on how to tell a traffic cop that you don't consent to searches.