I am optmistic about real privacy in modern times and publish quite effort on the topic, so that others can have verifiable privacy too.
On the other hand my dear counterpart, you have quite a few suspicious hardware decisions on your belt and already got exposed endorsing government developed tools like Tor.
There isn't a particular reason for me to call out the obvious attack vectors of using compromised hardware.