While this is a good idea, note that in some countries it is an offence to not hand over keys or passwords when requested (or can rapidly become one - like in the UK) so not carrying data with you in the first place can defend against that.
What is stopping them to force you to give access to your cloud providers though?
I think there are solutions to make hidden partitions. You would have have to create a clean, plausible system to show potential attackers.
Still feel that clouds providers are a bigger attack surface than encrypted local data. To get you cloud data an attacker would just need to be able to compel you to give the password. With local data, they also need to get physical access to it. You could for example decide to not take your laptop to a potential dangerous meeting and store it somewhere safe.
Plus, cloud provider have way more attack surface area. They get regularly hacked. Some state actors already have back doors or can otherwise compel the provider to hand out your data.
The more I think about the more I think storing sensitive data in the cloud is not a good idea for privacy and security.
What is stopping them to force you to give access to your cloud providers though?
Here's my thinking: If you're travelling to a country with nosy officials and you needed access to a lot of sensitive data, if it were on your regular (but encrypted) hard drive then it would be more visible if they asked to see the machine. With that data online, it could be in a system you only access by a URL you remember which they can't see. You can show them a normal desktop.
Still feel that clouds providers are a bigger attack surface than encrypted local data.
If you are actively being targeted, I agree. I was thinking more the "curious official" folks seem to run into when travelling. Since the mere possession of certain plain text documents is a criminal offence in my country, this has the potential to catch people unawares.
I think there are solutions to make hidden partitions. You would have have to create a clean, plausible system to show potential attackers.
This is a good tradeoff and would probably be fine unless they're really out for you - a whole other ballgame.
> What is stopping them to force you to give access to your cloud providers though?
The fact that a) the cloud provider is in a different jurisdiction b) many countries have very broad "anti-hacking" laws that they'd be breaking. It's not by any means a "naturally safe" way of working, but under the current hodgepodge of laws it has some benefits.
While this is a good idea, note that in some countries it is an offence to not hand over keys or passwords when requested (or can rapidly become one - like in the UK) so not carrying data with you in the first place can defend against that.