I fail to see the point.
Unless you have a Ph.D. in cryptography, don't invent your own safety layers; they tend to bite you in the ass sooner or later.
Agreed. No sense to spend the time reinventing the wheel. PGP encryption has been around for over two decades and is the proven and robust scheme. When applied to SEED phrases, it renders them indistinguishable from any other encrypted message, which is ideal for masking purposes. I can't think of more effective or widely trusted method for this use case.
BTW, relevant private PGP key can be securely cloned onto multiple hardware dongles.
And yet, PGP has been compromised countless times in the past, causing huge monetary losses and forcing users to leave the forum.
To put it in context, this isn't about which encryption algorithm is better; it's about exploring ways to camouflage the seed in unconventional (custom) ways that make it impossible for an attacker to derive it.
This isn't about PGP; we're tired of seeing these types of keys repeatedly compromised in the past because they're a cryptographic standard.
The main idea is to demonstrate that a person can customize their own security to a point that makes hacking impossible, even with partial data leaked.