"spend from cold storage" is only the first time.
Each successive time is "spend from storage you think is cold unless you have some vulnerability in your phone that some hacker is logging your RAM with, in which case it's such a hot wallet that the sun don't got anything on it."
If you want to spend from cold, you need to look into Bither, where the cold storage is an offline phone/tablet device.
I'm not sure what you are trying to achieve by posting that, but I am pretty sure you didn't build your phone from raw naturally occurring materials, and as such cannot be sure that is actually not tapping every single screen frame into some evil entity's computer. The same goes for your computer. And you use bitcoin? Outrage!!
Do you open up each device you buy to check exactly if all the pieces match the datasheet from the manufacturer? Are you sure the guy at the store didn't bug your phone or your computer?
If you want to do secure computing look into "How to make your own abacus" where the device does exactly what you see it doing.
Seriously, I know the implications and risks of using bitcoin. Or a computer, can we please keep this on topic? Do you know the answer to my rather simple and direct initial question?