You are absolutely right. Each person has their own threat model.
Some of the points that are in the quiz are not in anybody’s interest to implement unless you have an extreme threat model like Edward Snowden (For an example taking your camera/mic of your phone)
But for me, I still have various weak points I need to work on; one is that I still use type one Android (That is filled with bloatware/trackers and badly written code from a Chinese manufacturer)… I mean, at least the phone was cheap ![]()