Eirikr70
I have read and really appreciate many of your well written, thoughtfull and helpful comments here in the forum. So I'm sure you didn't want to paint a black and white picture dividing the world into Iranian journalists and drug dealers on one side and the rest of the world on the other. But as others maybe don't know, i wanted to add on:
I agree with you that relying on the secure element may be enough for many users here. However, in addition to the groups you mentioned above, there are people whose threat model may require a strong password.
As we saw with Pegasus (Pegasus != Cellebrite, just as a quite well documented example of misuse), it's not always just governments that have the financial means to deploy powerful state-of-the-art tools. And even in countries with a more constitutional state than maybe Iran, exploits can be misappropriated and used outside of democratic legislation.
Long things short: I think the much-cited threat model and a little reflection on whether you can and want to rely on the secure element is probably a little more helpful than considering whether you belong to one of the two groups mentioned.