Oh the beauty of multi-vendor multisig 🤭
One very important clarification!
This particular attack actually "encodes the secret key into low entropy secret nonces and uses them in signing", so it's not just grinding the nonces.
What does this mean?
In the "classical" nonce-attack you either need a LOT of computer power or a LOT of signatures, which makes harder to pull off.
In his variant above they reduced this to only 2 signatures (for 12 words 4 for 24 words) vs ~64 signatures for the classical attack.
(again a lot of caveats I'm hand waving :p)
which is a great improvement and way easier to pull off and requires fewer steps to be taken by the person being attacked.
Source: https://darkskippy.com/taxonomy.htm

Discussion
You seem to ignore the imense trade-off that comes with that.
Storing extra shit.
Oh no how could I ever store an easily exportable file/qr code that is not security-critical and thus can be stored in more locations with only privacy considerations..
The tooling around multisig has improved dramatically, Specter, Nunchuk, etc. Throw that sheet (or file in a flash drive) at every location where a seed of a signer of the multisig is located and you're done.