(no tails support though, argh)
Perhaps there is some scenario that involves bringing together multiple electronic devices to increase the effect
like a LAN party?
The US gov can detect the use of hidden volumes
It's important to state that if the hidden volume within an encrypted container has been created correctly and is used correctly (see below) on a machine that does not have compromised OS or firmware, the presence of a hidden volume cannot be proven. The encrypted free space remaining after the main volume's data ends is as random as any other encrypted data (including hidden volume data).
Care must be taken with backups. If two copies of the same volume exist (main plus backup) and the hidden partition of one has been altered while the other has not, then this can reveal the existence of a hidden volume.
We also heard that unexpected reboots are disruptive
My head literally reels with the notion that they need to hear unexpected reboots are disruptive to know they're disruptive!!!! What??!!
U X e dUdX, e dX, cosine, secant, tangent, sine, 3.14159...