if we are sure that there are no vulnerabilities in the system, then we can connect to the internet.
Those who lost the coin also said at first "we were sure that there was nothing on our device".
We have the definitional boundary between hot and cold wallets based on due diligence and recognized by most technical experts. But you always have the right to enforce your wallet security according to your own definition.