Thank you for taking the time to respond đ
> - KEYS GENERATED BY USER USING ENTROPY FROM HARDWARE AND APP
This is unverifiable. Even if the code is open source (is it?) how do you know the device you hold is doing what it says it does? How can you verify?
(Note that every hardware wallet has this problem. The only way to validate the HWWâs process is to roll a seed yourself, then load it on multiple vendorsâ devices to confirm they all yield the same XPUB and addresses.)
Whether the seed was printed at the factory, or printed by a closed source process, one cannot verify that it was done securely and that nobody else has the key.
IF you were going to use multiple of these âtrust meâ seeds together in a multisig quorum, then you could be reasonably sure you wonât get rugged. Itâs unlikely theyâre all vulnerable at the same time, exploitable by the same attacker.
Regarding backups: if you canât extract/load the seed onto the device, then you canât back it up. Making a copy of the Ballet private key and using Bitkeyâs multisig backup seem to me to offer equivalent ways to recover the wallet following loss/destruction of the device.
Your other points are valid, particularly the point about address reuse.