In my personal opinion, there are currently completely "clean" alternatives for setting up systems (PCs) free of backdoors and leaks, using open-source hardware or auditable designs, without forced proprietary firmware, such as RISC-V (based on JH7110), with OpenOBS, Wireguard VPN, Tor, end-to-end encryption (E2EE) protocols, and secure-by-design, and a whole suite of open-source programs.
This should be, in my view, the minimum system I use as a crypto environment to avoid any suspicion regarding proprietary firmware in chips, processors, motherboards, operating systems, etc...
You can never be too careful, and I don't trust products from Microsoft, AMD, Nvidia, Apple, Meta, Alphabet (Google), Oracle, Cisco, etc... Generally, There are surely "clean" alternatives for everything you need.





* These tips are based on my experience and are intended for friends and family who want to know my perspective on the topic. They are not hard and fast rules or inflexible dogmas. If they resonate with you, follow me for daily tips.