all great points but 1) we have to interact with existing systems using legacy addresses and 2) how do you verify the address is correct when it is completely abstracted away?
Discussion
Allow me to rephrase #2. I worry about the additional attack surface that each new layer of complexity introduces. Verifying your own on-chain address is hard to beat in terms of simplicity and security.