As far as the OP is concerned, a wallet generated via a dice roll and pen
would have worked to circumvent the vulnerability.
And we probably have different definitions of “trustless.” See here for a common understanding within crypto:
https://www.preethikasireddy.com/post/what-do-we-mean-by-blo...
It doesn’t mean “you can perform some action without trusting anybody or anything at all.” Protocols, software, hardware, and even your environment will all require various degrees of trust.