never a good idea to store valuable data on a machine that doesn't use disk crypto, it has saved my ass on several occasions.
The disk crypto doesn't help in this case, because either (1) you use full-disk-encryption, which will be unlocked while the system is on, so a "copy" will copy the unencrypted data, or (2) The wallet file is encrypted only, in which they only need to keylog your passphrase to get it. Though, I have received some good ideas for helping with keylogging, but any malware advanced enough to compromise your offline computer could easily pull your crypto key out of RAM next time you unlock the wallet.
The goal is to avoid getting to that point at all: a serial connection that doesn't possibly induce any subsystems to kick in and try to help out.
in order to spend your coins, at some point the corresponding wallet must be on a computer, which i am assuming is offline in your threat model. in order to have some reasonable assurance that the computer's drive has not been tampered with while off, presumably stored in a safe or similar, you should use disk encryption. to suggest that disk encryption doesn't help reduce the chance of a compromise here is incorrect, afaict.
of course, if your machine is rooted, the attacker has DMA. the usual means of defeating keyloggers is authentication tokens, but that is only of limited use on an offline machine.
I never said that disk encryption is pointless. But Armory already encrypts your wallet, and guarantees that if your wallet is created encrypted, the unencrypted keys never touch the disk. By all means, you need encryption, but full disk-encryption is mostly redundant here. In fact, in some environments, it's inferior -- if you were to use full-disk encryption and unencrypted wallet files, then you are protected the same when your computer is off but the encryption is completely useless while the computer is on (so it can run the OS and access your files). Someone who gets on your compute for 1 minute can put in a USB key, and copy off the [unencrypted] wallet file to their key. Ditto for serial. At least with Armory encryption, the file on disk is always encrypted and inaccessible even when the computer is unlocked.
The counterpoints to these thoughts are: just hedge and use both -- disk encryption and Armory encryption. And in the end it may not matter--anything advanced enough to get to your offline system is probably advanced enough to pull your private keys out of RAM when you unlock your wallet to sign a transaction. No disk encryption can protect against that.
The security environment is this: you have an offline computer setup securely, and it has not been compromised in any way. You have a verified version of Armory installed and know it works perfectly (of course). However, you assume an attacker has full control of your online computer, and knows you will be using
If it's a serial connection that's not done correctly, they grab your Firefox password file and try every entry to TTY login to the offline machine. Once there, they grab the encrypted wallet, and start trying to brute force it (probably also related to one of your firefox passwords...). Or if that's not enough, they keylog your passphrase and send it back over the serial line to the online computer (which is compromised).
Similarly, if your transfer method is USB keys, there's undoubtedly lots of ways to exploit autorun. Put a carefully crafted file on the USB key with a payload that gets executed when you plug in the USB key, and it carries your wallet out with it when the user brings the USB key back to their online computer.
Any mention of Armory flaws, or initial install security is mostly out-of-scope. We assume the user installed the correct software offline and that the software itself performs exactly as expected.