Well, the configurable boot loader allows you to attempt the self-destruct feature. Of course, it won't work against enemies that image your hard drives and work on the copies.
My version of TC has a work around. You boot into the decoy OS and if you don't do something, it will proceed to wipe the data on the hidden OS, and it really only needs to wipe a megabyte or two to get the job done.
It only works on the assumption that they do not image my hard drive.
DiskCryptor does no have option for self-destruct. It have additional options on wrong password like handling boot sequence to another bootloader or rebooting computer. More to do with manageability and configuration flexibility and not self-destruct.
Similar to how Prey works, and how most phones have a delete feature if wrong password or something.
Phones don't encrypt data or do it with backdoors. All it takes is to desolder memory chip and read the raw data from it. It will keep out meth addicts from your private data it but not police.
The best way to secure data, in my opinion, is physical destruction of the encrypted media. The best way I can tell to do that is to have a small thermite bomb on top of the hard drive that ignites and melts it when you hit a panic button. (If you can get to the panic button.)
Really good 25+ chars random password is the best. Physical destruction is not guaranteed to succeed and why damage perfectly fine device? My panic button is located behind trigger guard and below slide but I'm not relying on it for privacy of my data.