There may be subtle interactions between the two algorithms that actually decrease security.
, which corroborated other anecdotal evidence gathered throughout the internet that there are certain unexpected paterns when encryption is overlaid. However, given how much time I spent looking for real-world examples of it and I couldn't find any I'm leaning towards giving up and just assuming that nobody is able to exploit such setups.
imho, your posted example is not at all the same as the link you shared.
you: key -> password + password
link: key -> key
and even if it was key -> key, the next paragraph seem clear
"Reality is much rosier. The previous warnings are true only if the different keys are related to each
other."