Well, if follow this version, then here is the answer to how to avoid possible potential data leakage for ledger users - don't use software from this company.
I don't think you can setup a Ledger hardware wallet without their software: you need to "install" each coin on the device. But even if we ignore this, avoiding Ledger's software isn't enough if there's a possibility of malware to target the device.
For several years now there have been allegations of vulnerabilities in the transmission of user data through ledger servers, software and devices in general, but no one has yet demonstrated 100% evidence and everything is based only on assumptions. I in no way justify the ledger, but damn, if there is a flaw, then show me, and don't try to convince me only on faith.
That's the wrong approach to look at this:
Ledger wants you to have "faith" in their products, despite the
fact they've lied on several occasions about the security of their product.
It turns out that belief in the vulnerability of ledgeris similar to belief in ghosts and UFOs - no one has seen them, can't prove their existence, but convinced that they definitely exist.

You're missing the point: by the time someone
proves the device is vulnerable to malware, your funds are gone and it's too late. It's better to avoid that scenario.