Another option is to connect to the internet using a portable router with a SIM card purchased “by a friend”, and use a safe encrypted device.
Sure, and for certain setups this is preferred. You can carry a secured laptop and a portable router.
However, if you want the form factor of a phone and the convenience of portability, a device that looks like a boring smartphone offers better stealth.
Wireguard / vpn helps in nothing if your device is already compromised through this SIM channel. Attacker will force it to make a connection without Wireguard / vpn.
If your adversary is the NSA you will lose no matter what you do. They can possibly escape the baseband and infect the linux (android) kernel running on the application processor to do anything they want.
For most normal people looking for privacy and want to carry a device that looks normal. This is a decent fit.
Same: it helps in nothing when your device is already compromised through this SIM channel (or other malware, e.g. famous Pegasus). Attacker will see your messages like you on your screen, and the fact that in transit they will be super-hyper encrypted is irrelevant.
Yes yes.. and there are 0days for everything that are sold to the governments. We know.
This is why I advocate for Graphene OS because it actually has most of the exploit mitigations turned on, hardware attestation, OpenBSD's memory allocator, etc.
For the average jet setter who needs to stay in contact with business associates and family this is overkill.
If you are Pablo Escobar you'll need something even more hardened.
1) They will be attacking your device as they described (more likely than normal operator)
You can't say that for certain. You are talking out of your @ss.
2) They will get hacked (as probably they are less sophisticated then normal operator, and also have users which are nice target: crypto users who want to stay anonymous)
Sure, bring it on. That's why you harden the endpoint.
3) They already might be LE honeypot like Anom
Sure. Spy all you want. Wireguard, Signal, microphone and cameras removed. Purchased with cash.
As with everything you need to do proper threat modelling.
You don't have to outrun the bear - you just have to be faster than the slowest camper.