Check out Fortress Linux, possibly using a version of xombrero, not sure https://www.fortresslinux.org/
Myself I was planning to use a separate login for web browser, streaming audio visual, etc, alongside an offline desktop for work on documents but with ports open to read and send e-mail, access a ssh account, etc. - a 'disaster rocovery' approach; plan on minimizing the damage and recovering as quickly as possible following a breach. I guess I should also make more use of profiles to separate misc. surfing from web accounts. In the past code injection has essentially rendered unencryypted Internet useless for myself. Encryption wise OpenVPN has not proved reliable, nor L2TP for some odd reason, though things may have changed with the recent SSL fixes (I'll give them another go at some point). However ssh running as a socks server seems to work fine, firefox will also resolve DNS calls over the socks connection (privoxy and polipo can be used to set up a socks forwarding http proxy for other applications and which usually will resolve DNS over the proxy also). Having used xombrero for a while I tend to configure firefox as similar as possible. NoScript usually only allowing scripts called from the web page itself (i.e., click 'allow' once and no more), AdBlock with all filtering options enabled, disable disk and memory cache, DNS and page prefetch, spoof the browser ID, I don't use this addon bit it gives a good idea of the setting that can be used to render firefox anonymous https://github.com/dillbyrne/random-agent-spoofer/ HTTPS Everywhere https://www.eff.org/https-everywhere Type about:support into the address bar to get an overview of what setting are set, etc. also eff.org's https://panopticlick.eff.org/ None of the above is any use unless the install is relatively untainted security wise, I run a very tight firewall also (but not yet got round to setting up the monitoring end of things yet), this I'm sure has helped in the past. I have learnt DNS servers are not reliable also - prefereably encrypt DNS, if not then use a server that advertises enhanced security as a feature. The net result, I only experience data injection occasionally nowadays (though obviously I cannot be 100% sure), more of a problem seems to confidentiality. As to the future, EMF issue, how secure are FreeBSD jails?, DNSSEC?, port the lot to Fedora, review of current authentication options in addition to password strategy - https://www.yubico.com/2014/11/neo-supports-u2f-otp-key-time/ looks interesting, etc.