In my personal opinion, there are currently completely "clean" alternatives for setting up systems (PCs) free of backdoors and leaks, using open-source hardware or auditable designs, without forced proprietary firmware, such as RISC-V (based on JH7110), with OpenOBS, Wireguard VPN, Tor, end-to-end encryption (E2EE) protocols, and secure-by-design, and a whole suite of open-source programs.
This should be, in my view, the minimum system I use as a crypto environment to avoid any suspicion regarding proprietary firmware in chips, processors, motherboards, operating systems, etc...
You can never be too careful, and I don't trust products from Microsoft, AMD, Nvidia, Apple, Meta, Alphabet (Google), Oracle, Cisco, etc... Generally, There are surely "clean" alternatives for everything you need.
