Only a weird assumption if you're going to be rigid with solutions. Think along the lines of adversarial maneuvering. Software and hardware solutions to combat and neutralize privacy leaking effects.
So there's absolutely no avenues of reverse engineering here, is what you're saying? If so that speaks more to Apple's competence in being able to lock things down.
There are certainly things you can reverse-engineer with relation to MacOS and Mac hardware. Not everything is reversible though, and even third-party projects like Asahi still have to run the Apple-engineered Boot ROM and device firmware. In the fictional, expressly non-real world where Apple deliberately compromises their hardware for intelligence agencies, you are a fish in a barrel. No amount of "adversarial maneuvering" will meaningfully save you.
Companies like Apple, Intel and AMD are proving to the world that the only secure hardware stack is a fully open one. God only knows what the second Snowden leak will reveal once current geopolitical tensions boil over...
Is it not enough to have a full view of all network requests? How can surveillance happen if we have full knowledge of what enters and leaves the device? Is there any evidence of hidden network requests?