I have so few bitcoins, so as a hardware wallet is more than enough, but actually when I read the 'protocol' as you call it even though a little paranoid, without flattery I really impressed. I noticed that you have almost think all possible cases where is possible your equipment to be compromised or the data could be intercepted but if I'm not mistaken I did not see anything to protect the computer and smartphone screens from remote access that is a tempest attack. I repeat that maybe this is an obsolete security measure but this with faraday cages were some of the obligatory security measures, more than 10 years ago, when someone wanted to protect sensitive data stored in servers and computer screens were located in rooms with windows and maybe near public places and roads. So, I would like the @OPs answer in my comment
Thanks! The protocol does have steps to put smartphones or other devices in a Faraday bag during most of the protocol execution. Appendix A (the list of "exceptional security measures" that are not part of the protocol proper) mentions larger Faraday cages (e.g. the entire room) as an additional measure one could take.