Truecrypt had a false volume for this very purpose.
You have one password to unlock your drive, and one password to fake unlock your drive and instead unlock a volume that looks like your drive, where you store stuff that looks important but isn't your real secret.
By physical here, they mean using your biometrics by force. They're still not allowed to beat you with a rubber hose.
A court, however, can force you to give up a password or hold you in contempt (which is essentially the rubber hose option). Having false unlocks defeats that
A court, however, can force you to give up a password or hold you in contempt (which is essentially the rubber hose option)
That remains to be seen; I don't think that there's ever been a definitive ruling on this in the US. One real problem is that they would have to be able to prove that you knew the password, and that can be a real problem. I have an old Tails drive; it's been years since I used it, and I have no idea what the password is anymore. Shit, I sometimes have a brain fart and can't remember the passphrase for my password manager, and I use that a lot.