No relation to GrapheneOS but in case anyone interested in hardware Trojans has nothing better to do on a rainy afternoon:
A study commissioned by the BSI (German Federal Office for Information Security) that shows possible leverage points in the production chain of complex IT systems that an attacker can exploit, e.g. by infiltrating hardware Trojans.
https://www.bsi.bund.de/EN/Service-Navi/Publikationen/Studien/PANDA/panda_node.html
The paper (in English) can be downloaded at the bottom of the page.
@GrapheneOS If this is too far off topic, please feel free to delete the discussion.