Well... yeah. The solution I documented is supposed to be for the single purpose of connecting remote workers to work. It's split-tunnel anyway, so **by design** it does nothing to protect against the other attack scenarios you mentioned. But even if it weren't split-tunnel, everything coming from that VPN would be from the same IP Address anyway, and so it would be a lousy solution for evading hostile governments. But it was never meant for that - it's only meant to connect remote workers to work.
The attack scenarios you brought up are real and they need a solution - but there are lots of VPN services designed to help solve them, and people have been connecting to them for years.
But - as I think this through - one huge weakness with VPNs in general is, as you pointed out - hostile ISPs can record traffic and analyze it later, and it's easy to spot VPN traffic. But now with COVID-19, if organizations everywhere adopt VPN technology, and now it's easy with my documentation, hostile ISPs can no longer make assumptions about VPN traffic. And so, maybe my documentation has some indirect benefit with the hostile government problem. But I don't think I'll pitch it that way.