

You’re thinking about this wrong.
Instead of trying to pick the one that will handle a fail state best, you can more effectively assume a fail state and take steps to mitigate it. That is to say: implement key (in your case, password) rotation.
Just establish a trusted system, log in and change your passwords periodically.
You can even do rolling rotation where you only change a few each week.
If that doesn’t seem like the right choice to you, then consider this: you’re thinking about an unconfirmed or possibly even uninvestigated situation where your secrets have been compromised. The solution isn’t to find the secret handling software that deals with this situation in the best way possible, it’s to change secrets.
Probably the best way is to unplug it from the charger and remove the battery.
You can’t effectively use the device while it’s not vulnerable to attack.
What kind of eavesdropping are you worried about? I ask because concern over advertising is different than concern about laser listening (a technology that was available to me in kit form as a middle school student many years ago).
It’s not reasonable to ask how to avoid all eavesdropping because without any context you quickly start wondering if you could recover from being rendered and detained for the maximum legal duration in your jurisdiction.