otherwise those who actually brute force a password, don't use the client, they open the file itself and you can't do anything about that.
If you were forced at gunpoint to deliver a password, it would be useful to have an alternative that isn't either take a possible beating/end up dead or either hand your hard earned money to said attacker. Right now with wallet.dat we don't have either a way to self destruct or a way to open an alternative empty wallet, or something like that. So I guess people is relying on FDE with hidden volumes? But that has been proven to be demonstrable that the drive contains hidden data. I was wondering if with a contained file like wallet.dat you could hide hidden data. I think Truecrypt volumes are safe when it comes to hidden data but not FDE and you must open the file anyway. I think plausible denniability methods of protection for wallet.dat is worth exploring.
If you have a proper backup setup then entering the password incorrectly by mistake shouldn't be a problem.