I love that line. Going to be using it a lot.
Sure, enjoy it.

At for the cost of hardware wallets on the secondhand market, leaving one around might not be the worst idea.
If it goes missing you can check you real one to make sure it's safe. But at that point, you know your security has issues because someone got in and got to your hardware wallet. Even if it's not your real one. Someone out there can no longer be trusted.[/quote] Are you talking about leaving one somewhere as a trap to be grabbed in case a thief breaks in to your home? That's not bad either but its different from what I mentioned in my previous post. I was talking about having a 2nd device, fully functional and set up to be used in your primary device goes missing or malfunctions.
Makes me think: in a pinch, you could even just wipe a HW wallet that you have around (of which you have a seed backup handy) and load the stolen wallet's seed onto it.
Sure, that would work. But again, you still need a second hardware wallet for this.
Comments about the Trezor attack.
The vulnerability existed in the 1.6.0 firmware version of Trezor One’s firmware. With ver. 1.6.1, they fixed it. If someone was facing an issue like a lost PIN but had a newer firmware version, I wonder if it would work if he downgraded to version 1.6.0 and had Kingpin work on the device to extract the seed like he did for the guy in the video? I know that it is possible to downgrade to an older Trezor firmware, but would the data still be extractable from the chip, that’s the question.
It's funny how they scrambled the seed words at the end of the video. Like it still contains any crypto.