Could you add the ability to safely wipe the Luks header with random data?
I've noticed that to wipe the luks header it's suggested that you dd a certain number of bytes depending on keyslot,stripes, keysize etc. That seems like something I as an end user could get wrong, possibly damaging the encrypted data or leaving traces of the header on the drive. Unless I'm missing something.
I think it would be good to add the option to safely wipe the header with random data using cryptsetup.