J.M. Porup:
In that scenario, this would only be effective against a government
agent who attempts to decrypt at the border and just blindly tries your
passphrase.
Of course, most governments (if not all) would be aware of the potential
for data destruction, and would simply seize your device, then analyze
it offline (and only ever work on clones of your disk).
They might detain you, too, then legally or extra-legally compel you to
produce the passphrase.
Even if you encountered such a miraculously dumb government, you might
still be exposing yourself to criminal liability (or worse) for
knowingly causing the destruction.
It seems what you really want is "good old" plausibly-deniable per-VM
encryption, so under duress you can capitulate and give the disk
passphrase, but not all VMs are visible, and no explicit traces of
"extra" VMs exist.
One way to do this might be to basically shard /var/lib/qubes and
qubes.xml, so you can store VMs on separate disks/partitions and load
them (i.e. make Qubes aware of them, so they appear in Qubes Manager and
work with all the tools) at will. Then make sure all Dom0 AppVM logs
are disabled, and make sure you store your TOP SECRET VMs on a
disk/partition that looks like completely random data (at the least: no
lUKS header).
This functionality would have the added benefit of allowing users simply
to store VMs on extra disks, which is a feature request that seems to
appear fairly regularly.
Andrew