I find the discussion a bit pointless. openSUSE is currently designed to be not particularly secure (you can see that if you install the default way, when they offer to use the same password for root and user). It is also extremely easy to change your root password if you have physical access to the PC.
So, first would be to have a mobile and not a fix PC and to make sure that nobody has free physical access to it.
Second would be to install only the foreseen software, so bye bye to libdvdcss, packman codecs and all the beautiful rest of it.
If you would use them, then you cannot be sure that the signatures provided are correct, as there is no written paper support in newspapers that report the fingerprint of the GNUpg signatures of the repositories (as far as I know).
Encryption and SElinux is overkill? Depends on your personal life and the use you are doing of the pc. I think for me personally it would be very useful to achieve full disk encryption with /boot on usb-key and to activate SE linux. But I can assure you it is far from easy, the howtos for me did not work at all and then in this forum they are going to tell you not to bother. So my suggestion would be, you study first the boot sequence of suse, password protect grub for not allowing the substitution of the root password (look also at the write permissions) and once you are able to do it, to encrypt the root partition with external usb-key (good luck!).
KlamAV is actually counterproductive because it is a not required functionality, with a program that requires root access, if you want to run it with real time file access. IMHO just a way of having one first day exploit more.
If you are worried (and have reason to be worried) then you would probably also deactivate the time coordination functionality via the nist internet time service.
As you see, there are a lot of things you can do, you do not use any add ons in firefox any more, not even the eyecandy stuff. You deactivate javascript, flash and deactivate bluetooth.
All depends what you are searching for.
Try first the easy and fast steps. How is your password?
Is it long enough?
Do you change it regularly.
Is it maybe even random for root?
Did you configure wallet to close soon if not used by an application?
If you are just worried for your privacy:
noscript, foxyproxy, privoxy and tor.
But there if you are going paranoia then you could argue that tor servers have been setup in masses by certain agencies (not the travel ones) that are interested in the net traffics. But it does protect you against commercial data collection, to a certain extend.
Deactivate cookies or set private data to be eliminated by your browser after closing the session.
You will use a mailbox with POP3 that offers secure transport and secure password, you will change the password frequently. You will use openVPN and a VPN server to avoid exposure of your mails and pc in hot-spots when traveling.
But I would agree that SElinux and easy achievable disk encryption should be part of the basic features of opensSUSE. A notebook can be stolen and contain data important for you and for others, private photos and bank informations, business documents and so on and so forth. As far as I know they are candidates / in evaluation for 11.2 and maybe we are going to see finally very useful features like a working vpn service with networkmanager, a good coordination with kwallet and a working and conveniently configured SElinux as well as full and easy disk encryption via Luks.
If SE linux is too complicated and AppArmor is not developed any more you could have a look on the Tomoyo project.
In the meanwhile you could just begin to study the howtos and technical info available on the internet. More knowledge you have more you are on the safe side. For whatever you may be afraid of.
P.S. I forgot the most important feature for free internet and protection of privacy:
Vote!
And think well before, for** WHOM** you are voting 