Yeah right on. I've audited most of the professionally including the Trezor glitch attack. I use an old laptop with tails and sparrow. Hardware wallets are general purpose computers besides anyway. They are all Turing machines and even the most open source of the "hardware wallets" is running on top of closed source ROMs that boot the chip.