The whole thing is interesting to me from the perspective of those who deliberately mix words in case their backup is stolen, which according to the author of this video makes no sense.
An interesting video for sure... it demonstrates the futility of using this "system" to try and obfuscate your seed words. However, there are a couple of caveats that do need to be noted...
Aside from knowing the 12 words... you also need to know:
1. The wallet that was being used
2. The coin-type that was being used
3. An address from the wallet
4. A rough idea of the index# of that address
He kind of glosses over the fact that if the address you have is
not one of the earlier addresses (ie. index < 10), then the time required to find the correct combination can increase quite significantly.
The creation of the seed permutations themselves is trivial... you're simply rearranging 12 'tokens' and, as jackg pointed out, with 12 words you only have 479,001,600 possible permutations.
The "heavy lifting" is the part where you need to take those 12 words, convert them to binary to form the seed, then generating X number of private keys, then derive the public key/address from those private keys and then compare that with the example address you have provided.
I wonder what the effect on his "ETAs" would be, if part of your strategy (in addition to scrambling your seed) was to start using addresses at say index 10, or index 20... or index 100?