In my opinion, your setup is likely to be insufficient for the purposes you want, and in some minor or not so minor ways may be more likely to draw additional scrutiny (i.e. grapheneOS (minor)/tailscale(?)).<p>Physical access is almost never needed with current consumer hardware, especially if they control the infrastructure, which they do.<p>Any services you access through their network, can potentially be impersonated later or denied while you are there. Cookie capture for auth access tokens is real and very simple to do, and there are many other security threats in the IT space.<p>You should follow good security hygiene when starting and ending engagements.<p>You may want to limit your personal access through an intermediary, and almost surely should do a full account reset for all related services/systems you access while abroad upon your return, if you do not choose to create stubbed accounts.<p>It may be better to use limited stub accounts while traveling, which may also be used later as a tripwire indicator/honeypot of interest related to a particular trip.<p>From what you've written, it seems that you neglect the fact that physical coercion negates all your current security measures.<p>You should familiarize yourself with the laws there regarding VPNs, and the related requirements, as well as the customs of business in that country. (i.e. Gift Giving on first meeting, Who pays lunch, that sort of thing).<p>Not that it will come to physical coercion, or that it is even likely given your profile, but still, you should be aware and prepare accordingly. It is all about risk management.<p>As for what threats you should be worried about, its generally nothing you wouldn't already consider in any other country where your personal security is not guaranteed.<p>If you are particularly concerned about your safety or security, or are entering a high-risk area, K&R insurance, its related planning and preparation for travel abroad often covers the most critical important aspects. This is their jam. Cyber-related losses may potentially be covered under the extortion part of these policies.<p>Generally speaking, the sooner your state-side counterpart knows there is an actionable issue, the quicker they can react, and this will largely be decided by your level of acceptable risk and prior preparation. Regular check-in's are good practice.<p>Subtle challenge response phrase check-in's may allow you to indicate duress, or that you are missing (and not the one responding) in some extreme circumstances.<p>I'd like to emphasize, none of this is likely to be needed, but these things do happen, and still it is prudent to plan for the worst to give you the best chances if something does go wrong.<p>You should consider that whatever you access directly while you are there will not be private.<p>Also, the night before is hardly the right time to be asking these questions.<p>There is a lot of business process that generally needs to be implemented for proper risk management in an international business setting.<p>You may find this article helpful as a starting point, and may consider reaching out to one of the companies that specialize in these services, if further more detailed knowledge is needed.<p><a href="https://us.milliman.com/en/insight/pirates-kidnappings-and-ransom-the-business-of-k-and-r-indemnity-policies" rel="nofollow">https://us.milliman.com/en/insight/pirates-kidnappings-and-r...</a>