CRYPTO SHREDDING is the practice of rendering sensitive data unreadable by deliberately overwriting or deleting encryption keys used to secure that data. For example, an entire table of customer personal details could be encrypted using random keys for each record, with a different table storing the keys. If a customer exercised their “right to be forgotten,” we can simply delete the appropriate key, effectively “shredding” the encrypted data.
@njoseph_1 or you can overwrite your LUKS header, effectively "shredding" your whole encrypted disk.
It's a pretty powerful idea, and I think think there's more interesting applications of it waiting to be discovered.
On a serious note:
I'm sorry if this happened to you.
However, the whole point of LUKS key-strips is that they can be easily destroyed, with very little chance that the key will survive.
(eg. when you're in an oppressive country and police enters your house)
All LUKS tutorials I've seen mention backing up the LUKS header... though I guess they could be more explicit about how important it is.
There's lots of tools out there with which you can hurt yourself if you're not careful. But people who use them know they need to be careful, and generally are careful.