> the weak point in this scheme is loading the privkey into a computer to generate the checksum and/or pubkey
Entering the seed material into a computer of some kind at some point is inevitable. Even if you use a hand-computable checksum offline, you still eventually need to generate a fingerprint, XPUB, addresses, etc.
There are at least three different risks we want to mitigate: weak entropy, leaked keys, and lying wallets. Rolling one’s own offline seed material takes care of the weak entropy.
To mitigate the other two risks, use multi-vendor multisig. So long as your separate vendors are not compromised at the same time by the same entity, your funds should not be movable by anyone other than you.