That's not a migration pathway though, in the sense that many other things can have one.
Even if you add, let's say, fields for a falcon sig and pubkey, a quantum baddie can ignore the falcon sig and just forge a valid schnorr sig for your identity. To the legacy part of the network the forged event looks authentic. For a migration to actually protect you, every relay and client would have to disregard schnorr sigs altogeher. So siging schnorr over falcon (or whatever) is a pointless act. No matter what, you end up with a breaking change, no cross-fade.
Also there is no mathematical pathway to derive a lattice-based key from an elliptic-curve key. This means every user would have to generate a brand-new lattice key, post an event signed by the old schnorr key attesting that the new key is the rightful heir. And where does that attestation event go? And will all in the decentralised network know about it? And what about agreed time-stamping, etc. (All requires *some* centralisation.)
And after q-day the schnorr key is meaningless and the baddie can post that same event claiming one of their falcon keys is the rightful heir, maybe before you get round to it, if this all happens fast enough. Or maybe delete your attestation event and post theirs in its place, and so on.
Also any baddie from q-day onwards can insert anything into your history before q-day and it's indistinguishable from anything else in your history, at least at the atomic event level (which is what nostr is supposed to be).
Basically nostr as it stands cannot be advertised as the future. It doesn’t really matter how you assess the quantum threat, for the coming years with quantum-vulnerable cryptography you’ll be swimming against the current of internet opinion, and that's the real issue, not the true nature of the threat.