Private key 1 = Hash(seed +"1")
Private key 2 = Hash (seed + "2")
It's actually:
Seed phrase and passphrase (if used) are fed in to 2048 rounds of PBKDF2 using HMAC-SHA512 to derive a 512 bit seed number.
512 bit seed number undergoes HMAC-SHA512 to generate master private key and master chain code.
Master public key is calculated from master private key using elliptic curve multiplication.
Master public key, master chain code, and index number are fed in to HMAC-SHA512, and the left 256 bits added to the master private key to generate a child private key. The right 256 bits become the child chain code.
Repeat the last step multiple times to work down the derivation path to reach your desired private key - for a legacy address on Electrum this will be m/44'/0'/0'/0/0.
Backing up a seed phrase is better than backing up an individual private key for multiple reasons. It is easier to do (since you should be writing it down by hand on paper and not storing it electronically), it is less prone to errors, it provides access to all your addresses instead of just one, it doesn't encourage address reuse, it solves problems with change outputs, and the list goes on.
-snip-
Although you are obviously correct regarding a seed phrase being secure, it actually doesn't matter if BlackHatCoiner
thinks it is more secure or not. He used Electrum to generate a private key, which means that private key
must have come from a seed phrase. Whether or not he backs up the seed phrase or not makes no difference to the fact that his address is only as secure as the seed phrase which generated it.