Thank you for taking the time to respond š
> - KEYS GENERATED BY USER USING ENTROPY FROM HARDWARE AND APP
This is unverifiable. Even if the code is open source (is it?) how do you know the device you hold is doing what it says it does? How can you verify?
(Note that every hardware wallet has this problem. The only way to validate the HWWās process is to roll a seed yourself, then load it on multiple vendorsā devices to confirm they all yield the same XPUB and addresses.)
Whether the seed was printed at the factory, or printed by a closed source process, one cannot verify that it was done securely and that nobody else has the key.
IF you were going to use multiple of these ātrust meā seeds together in a multisig quorum, then you could be reasonably sure you wonāt get rugged. Itās unlikely theyāre all vulnerable at the same time, exploitable by the same attacker.
Regarding backups: if you canāt extract/load the seed onto the device, then you canāt back it up. Making a copy of the Ballet private key and using Bitkeyās multisig backup seem to me to offer equivalent ways to recover the wallet following loss/destruction of the device.
Your other points are valid, particularly the point about address reuse.