This is definitely much easier, but just wanna add that a keylogger is a rootkit, it's capable of uploading files from your computer as well as logging keystrokes, so you aren't protected from a compromised machine unless you use a hardware wallet (even then, it's possible to divert funds if you don't verify the recipients etc).
Good point, thank you for the clarification. Maybe then the only significant attack vector this would mitigate would either be video (seeing the 12 words typed) or some sort of sound based key logger that could be on your phone or another device in the room.