It looks like they are still living in 2013 and not 2023.
If you are an innocent person (for I have no pity for criminals) and you are about to be raided by some law enforcement somewhere, I advice converting the seed words into the 128 (or 256 for 24 words) bits of entropy, encrypt it with AES-256 with a password chosen by you, write the password down, and re-encode the AES-256 as a 24-word seed phrase and write that down too.
I already have a pair of encrypt/decrypt programs handy if you want to do that: https://github.com/ZenulAbidin/encdec
The result will look like a dummy seed phrase, but it will usually be an invalid seed phrase because the checksum at the end will not match up. Either way, it is almost certain that the resulting private keys will have no coins inside them due to how HD extended key derivation works.
Nice for you to share that link but would that really work? When you leave yourself clues how to decrypt your wallet you leave clues to expert too.
And just like it says, they are going to look for anything that resembles passwords too. And for sure they are using every possible combination for brute forcing in every way they can think of.
I am thinking that Vitalik was on to something by giving half of the privatekey to someone he trusted. It might not stop interpol but i don't think Vitalik would need to stop them as he is legit.