I'm still trying to figure out, if it is possible to use Bitcoin in a trustless way. So that no matter which parts of your tech stack are faulty or malicious, you keep control over your funds.
The following is what I got so far. I never used Bitcoin. So correct me, if something is wrong please.
1: Create a seed phrase with dices
2: Write it down on paper or carve it into metal
3: Buy a hardware wallet with no internet connectivity.
4: Never connect that wallet to any other device.
5: Type the seed phrase into the hardware wallet
6: The hardware wallet will display an extended public key
7: Install a software wallet on a computer with internet access
8: Type the extended public key into the software wallet
9: To do transactions: Create a transaction in the software wallet
10: The software wallet will show a hash of the transaction
11: Type that hash into the hardware wallet
12: The hardware wallet will show a signature
13: Type that signature into the software wallet
That's it.
As I understand it, there still is trust involved in steps 3 and steps 6:
3: There is not an easy way to check if the hardware wallet really has no internet connectivity.
6: There is no way to check if the hardware wallet really uses the seed phrase to create the extended public key. It could create an extended public key that the vendor can predict. One could test it a few times with throw-away seed phrases, but one would never be 100% sure.
8. You can usually export it more conveniently. 10-13 is overkill. Most wallets have some reasonable way to move txes between hardware wallet and online system (like SD card). They don't really compromise the practical security and are a much better UX.
3. checking if hardware really have no internet connectivity is indeed a thing. You could use Faraday Cage to be certain. Some wallets like ColdCard are translucent so you can inspect the components.
6. It is maximally secure to generate seed phrase manually using dices and paper lookup table. If you enter it into two wallets from two different vendors, you can see if they generate same addresses.
There's one attack you're missing: Hardware wallets could possibly slowly leak your private key by biasing bits in the signatures by grinding nonce. It would take whole lot of txes, but it is theoretically possible.
There's also possibility of someone just analyzing the electromagnetic waves during hw wallet signing txes to extra a key. Very very sophisticated and unlikely, but since we already have the tin foil hat on... just invest in Faraday Cage. :D
For maximum tin foil hat security, use multisig between two or more different devices (and/or parties), signing in different locations.
Edit: Oh. And since you're so into it it's worth mentioning that using seed passphrase is always a good idea!