It is good to see different opinions on this topic and I like the fact that it is being discussed.
Again, there is no " one size fits all " ... there is no single response to a threat, given that we all have different operating environments ( not operating systems

)
One thing I would like to clarify in your post is the reference you make to " ordinary Mac users " and " ordinary Mac users's computers "
If you look at this from a " bad guy " perspective, how would you differentiate between an ordinary Mac user/computer and a non-ordinary Mac user/computer, unless you profile the user/system first.
I mentioned it before, computers are no longer the target, people are.
In terms of skills of hacking ... the technical skills required to " hack into systems" have long been transferred to tools. The interpretation of the results are still with ( bad ) people.
For me it has always been a good thing to continuously investigate the ( ICT related ) vulnerabilities and the threats that my employer is faced with every day, and coming up with controls that are effective.
It was pretty clear more than 10 years ago , and still today, that your firewall on your device is an essential layer of your overall defence.
The biggest challenge is layer 8 of the OSI model .... the layer between the chair and the keyboard.
Cheers ... McBie