None of the methods proposed by Trezor would frustrate the attack mentioned in the article:
Validate the holograms: Most users aren't forensic experts and don't have an authentic physical sample to compare their evaluation target to, only photos of one.
Only buy from authorized resellers such as the official Amazon shop: Fake products have been introduced into Amazon's supply chain before [1].
The bootloader validates the firmware and displays a warning otherwise: Sure, but so does the fraudsters' bootloader.
From their forum earlier this year: https://forum.trezor.io/t/protect-from-getting-a-fake-trezor...