I recommend watching Chris Dumas' videos from defcon, he demonstrates that hardware backdoors do exist and that it is possible to find them, although it is a lot of work.
On the other hand I think the groups that have access to the hardware backdoors are very small and distinct from that of the typical OS backdoor.
Hardware backdoors are extremely expensive as compared to software backdoors. The only instance I know of a major hardware backdoor is the Intel Management Engine
Though AMD is supposed to have one as well.
Idk about phones though. Would like to learn more.
I recommend watching Chris Dumas' videos from defcon, he demonstrates that hardware backdoors do exist and that it is possible to find them, although it is a lot of work.
On the other hand I think the groups that have access to the hardware backdoors are very small and distinct from that of the typical OS backdoor.
Hardware backdoors are extremely expensive as compared to software backdoors. The only instance I know of a major hardware backdoor is the Intel Management Engine
Though AMD is supposed to have one as well.
Idk about phones though. Would like to learn more.
Is it this video?
https://www.youtube.com/watch?v=jmTwlEh8L7g