That's where the open source part gets relevant. Harder to sneak in a backdoor when the entire design is open sourced, formally proven and (at least theoretically, given that this needs skill and is a destructive attack) everyone can verify with a microscope and a camera that the actual silicon layout matches what is specified in the design.
That's where the open source part gets relevant. Harder to sneak in a backdoor when the entire design is open sourced, formally proven and (at least theoretically, given that this needs skill and is a destructive attack) everyone can verify with a microscope and a camera that the actual silicon layout matches what is specified in the design.