I use 2 Kruxes. One does BIP85. The other is my wallet.
Load the 24 word child seed via BIP85 on one Krux. Scan it with the other. Reboot the first Krux & load the 12 word passphrase via BIP85. Scan it with the other.
With Krux, it's possible to create a variety of complex puzzles. I personally enjoy designing them, using two Krux devices, combining elements such as encryption, encodings, mnemonics, keys, and passphrases. Now on beta there are account derivations and BIP85 to further enrich the puzzle-making experience.
In the device's user interface, we strive to minimize excessive warnings and avoid blocking features 'for the safety of the user.' However, when communicating with others, I emphasize the importance of caution, backups and tests. Complex puzzles can be bewildering and splitting a wallet's secret into 'x of x' parts can introduce additional risks.
Be careful

!
When considering the use of BIP85 child seeds as passphrases, or any other deterministic approach, it's important to be aware that an attacker could potentially brute-force the second secret (the passphrase) from the first secret (the BIP39 mnemonic). As a result, this method introduces a less secure layer compared to adding a non-deterministic secret to your setup.