schweizer
In the US, providing a duress PIN to the authorities and it wiping the device will be treated as spoliation of evidence. The legal remedy for that is the judge instructing the jury that they are to presume you intentionally destroyed incriminating evidence; in practice, that is basically always going to result in a guilty verdict.
You can also be charged with destruction of evidence, which in the US is a federal and state crime.
Similar rules/laws apply basically everywhere in the western world.
In the US, unlike most other places (including basically all of Europe) you generally can't be compelled to provide a pin/password, the refusal to do so can't legally be used against you, and you generally can't be punished for refusing to unlock a device.
In the US a strong password is a far superior option to a duress pin if you are worried about law enforcement.
A timed duress feature that is set before your device is ever seized and activates without any input from you would generally not have any legal consequences in the US, or most of Europe. At least if you have set the timer short enough so that it triggers before the government can get a court order to turn over your password (in the case of the EU).
Bluntly, you appear to have made zero study of the legal landscape vis a vi duress PINs or compelled disclosure of passwords in either the US or EU.
Before anyone chooses to use that feature they really should consult with a local attorney because using it could fuck you hard.
Against NGO's, Duress PINs tend to be even worse. If an organization has kidnapped you and is trying to compel access to your device then you are presumably already dead. Wiping your phone isn't going to make them more likely to free you, and cracking a strong password is already effectively impossible. Duress PIN or strong password, either way your data is just as safe.