Sorry to say, but you seem to have misunderstood (or understand only partly) what I meant. Probably also because I've been too brief.
I do not say that the method of having a TXT file is better than having it on paper. Nor is it the ideal method. Just present ways on how to store the information.
Also, I make it clear that when you do this, you must save the respective file in an inaccessible location, perhaps offline. For example on a pen drive, in the same place where you can keep a paper with the key.
The problem is not only the "inaccessible location". The problem is that the HDD will still have traces of that file (so there's a risk to get stolen).
The problem is that pen drives and even HDDs or SSDs can suddenly crash/become irrecoverable.
The problem is that when you plug in a pen drive, if you are online, you expose it.
All in all, the best way to handle the seed is to generate it offline (preferably in a live OS with no persistence or hardware wallet) and keep it always offline. So the proper solutions are not IT related: paper, steel, ...
Far be it from me to try to fool newbies!
Fooling them can mean bad intentions. I didn't say that. I said mislead, which can be unintentional.
Once again I make it clear that the memorizing method is not for everyone, although it is possible.
By the way, many who are in the cryptocurrency world have very good mental abilities, some are excellent mathematicians and high level programmers. What may seem difficult to decorate for some, can be very easy for others. It is up to each person to know their capabilities and act accordingly.
You are missing important points. Yes, many have excellent brain
now. But that doesn't mean the situation will be the same in 10 years. Even more, many are young, so this is normal. But time plays strange games with the brain and one may not remember things exact in some years. Then, accidents can happen (from car crash to falling off a cliff or brain stroke), damaging badly one's memory. So no, memorizing can be handy but it's very unsafe.
Either way, the indicated methods do not need to be used alone, the combination or use of several is possible and recommended.
Using more than one method can indeed be good and convenient as long as one doesn't use methods that can help hackers (txt file).