I haven’t read the whole thread, but yes I believe you are correct. I’ve been saying this for a long time, and it’s not just me. It’s not like we magically can throw away the need to verify the computations, we’ve instead taken a trade-off.
I feel to say otherwise is misleading.
On the ZK side, that’s part of why I’m so interested in eventually replacing the IC’s VM with a zkWasm VM. Discussion here if you’re interested (and there is a team already working on zkWasm): Zero Knowledge Internet Computer Virtual Machine
Edit: but then again, if a 2/3 majority is malicious, they could produce erroneous proofs. The proofs would have to be correct, but I believe there are certain attacks that would still be possible, probably double-spending