This is a great response. I think many people don't understand the logs that are collected about devices, how much entropy they reveal, and the analytics tools out there. Even these "off chain" data can be analysed at scale sometime in the future - especially if you're aiming to use some of the most popular wallets (that are more likely to have logs subpoenaed).
However, I think your point about knowing what you're protecting against is key. Even OP's setup is better than nothing - reduces chances of being confidently targeted by most actors. But if you're a journalist who is hated by your government they could turn the eye of Sauron on you and figure out a lot of the picture pretty quickly.
Excellent point about approaches like this actually turning custodial solutions like WoS into targets themselves.
I agree, I think a threat model is important here. It is all a spectrum.