I see an additional problem with having no analog mnemonic recovery words backup. IIRC most hardware wallets won't show you the recovery words (what you call "seed") again after a wallet has been setup. So there's usually no way to retrieve the mnemonic recovery words again when you don't have an analog backup of them.
This could be problematic in the future. As others I wouldn't skip having redundant analog backups of mnemonic recovery words!
Yes, it's unlikely that three hardware wallets stop to work all at the same time, but if one stops to work, you are left with only two. If another stops to work, you're left with the last one. Without the recovery words, you can't add a new device. See the issue?
(Some devices have cheap screens that fade with time... The device is working but if you can't see what's on the screen anymore it becomes useless and defunct.)
Then there's the question: are the three devices in one place (geographic single point of failure; e.g. loss by fire) or do you intend to distribute them to different locations?
Regarding 2.
One BIP39 word represents only 11 bits of entropy if it's known to the attacker that your mnemonic passphrase is only composed of BIP39 words. Question is: does an attacker get to know this? I'd say this is unlikely, but an attacker could try and 44 bits of entropy isn't very strong.
Regarding 3.
Any unique extending mnemonic passphrase creates a different and unique HD wallet. The smallest error gives you an empty wallet. And if you use a mnemonic passphrase you should document it separately from the mnemonic recovery words.
Do not try to only memorize it, this is a recipe for later desaster and I can almost certainly guarantee you, it will lead you to trouble and loss. (I have first hand experience with a mnemonic passphrase where I foolishly only documented some good hints, even when it was constructed by something I was familiar with, but apparently I made some tweaks which I forgot after not so much time and I couldn't reconstruct the mnemonic passphrase easily anymore. It wasn't a drama because it only was a Testnet wallet but anyway it opened my eyes to properly document
everything!)
I would aim for more than ~120 bits of entropy for the additional BIP39 mnemonic passphrase. It's also a question of how easy does your hardware wallet make it to use an additional BIP39 mnemonic passphrase. I don't deny that security comes with additional cost and/or pain factors. It shouldn't be pain in the arse.
I use an extending BIP39 mnemonic passphrase for multiple reasons (list below might not be exhaustive):
- the mnemonic recovery words alone only reveal a "canary" sacrificial wallet where I could detect that my redundantly distributed mnemonic recovery word backups got compromised if little funds there got moved away
(Pay attention to not easily link your main stash with such sacrificial funds!) - with any unique mnemonic passphrase I can create a new unique wallet and still only need one set of redundant backups for my mnemonic recovery words because those don't need to change; I use paper and stamped metal washers backups
(I don't need that many wallets, but it's just quite convenient this way) - of course every additional BIP39 mnemonic passphrase needs a separate redundant analog backup which is not where the mnemonic recovery words are stored, too; I don't make it too complicated: one backup at home, another somewhere else (unlikely they get both destroyed at the same time)
(You can append a numerical counter to your mnemonic passphrase to generate an arbitrary number of unique wallets and still only need one good redundant backup of the part before the enumeration counter. That way the amount of redundant backups is significantly reduced while still allowing a lot of unique wallets if you need them)
Last post edit: typo removal