The downside to these hidden volumes is that the OS you would be providing access to will show little to no use over the past x number of months. Those solutions offering the feature, actually recommend NOT using or writing to your decoy system after setting up the hidden volume.
Sure you could tell them you never use the laptop and just bring it for travel. The idea being you cannot prove a negative.
Some encryption software offer a feature that says “Hard disk Failure” on boot. But it really accepts a password.