(THAT, cite of tptacek, fulfilling someone's request, downvoted - with.. such empty*, hypothetical argument ?? - so far it's a libel - at least make some effort to proof otherwise in that case Mr FSFdiscreditor..
*"easier to hide backdoors" - so you don't need source to check the _real_ code - only more effort)
-
vs attack surface ? (having no reasons for powerful adversaries)
( https://www.tomshardware.com/news/crucial-samsung-ssd-encryp... https://community.wd.com/t/what-do-you-think-of-the-security... https://www.zdnet.com/article/flaws-in-self-encrypting-ssds-... https://techreport.com/news/256-bit-aes-encryption-broken-in... https://security.stackexchange.com/questions/134564/how-secu... and some Defcon(?) files I can't find now - no success with Intel ? )