Yes, it was fairly technical and fairly dense.
I think the scenario is this.
- the user has one Librem Key with secret keys stored on it
- the user has a backup of the secret keys in a file on a removable drive and the file is encrypted using a secret key that is on the Librem Key
- the user buys a second Librem Key
The goal is to load the second Librem Key with the secret keys that are on the first Librem Key (which of course cannot be done directly since no secret keys can ever be extracted from the Librem Key).
That entire process is conducted within a disposable VM that is also isolated from the network.
One possible clarification that I would make is that the section
Verify the keyring is intact
is actually doing something additional to verification. It is getting it to display the fingerprint of the key - because that fingerprint is needed in the later step: