~snip~
But, you know, the problem is that most people use weak passwords.
A proper password must provide security of 100-bits or higher, while also avoiding dictionary attacks.
Examples:100 bits of entropy, avoiding dictionary attacks: k9OS_j1Bnmp!5sPr
100 bits of entropy, susceptible to dictionary attacks: 1Bankruptcies2&%
[1]Apart from that, if your password is as complex as it should be, then you need to write it down and store it safely, in more than one backups.
So you just transpose the whole backup efforts from your seed phrase to your password / passphrase. I don't think it's worth it.
[1] source:
https://proton.me/blog/what-is-password-entropyYeah, that's a good point.
I assumed the user would use a password generator and add some extra random symbols manually to make it quite strong.
It's basically the same as the seed phrase in the end... if you leave it in public, then your BTC is gone.
I think the user should be comfortable using a strong secure way to hold the keys.
This might be different for every person.