It has been suggested somewhere that moving all the XMR tokens to an interim XMR wallet before the XMV fork and then moving it back to the original XMR wallet after the fork would mitigate the security/privacy threat on the original XMR wallet regarding this event. Is this a valid method to a certain extent? If so, what are the other underlying or remaining vulnerability after employing such a method and how could it be improved?
The Monero team has some mitigations almost ready for this. They will be included in the coming builds, which should be available before the key reuse clone.
One of the mitigations is a shared ring database, which will remember which outputs use which ring, so you can reuse the same rings when spending an output on different chains. Ideally, both Monero and any key reusing clone would have this mitigation merged. However, should the clone not bother to include this, it is still as effective if spending on the clone first, though it is a bit more unwieldy.
More information will be available, and included in the Monero GUI.