dhhdjbd
Well, let's say that not having the hardware in the first place, cannot be used in the wrong way.
When we make an effort to try to think what could go wrong, we usually have the normal patterns and behaviours in mind, but when we assess a situation we really should include possibilities that breaks the normal usage.
A malware could play with no rules and bypass normal system logic.
The common example I use in these cases is the soft kill-switch some thinkpads have for microphone.
With a common pulseaudio installation you can easily turn the microphone on keeping the led on (suggesting microphone is off) and you didn't even perform a proper attack, you just called some driver's "API".
With a physical kill-switch, once you disconnect the microphone, it is physically disconnected and therefor not available to whatever software, system and malware included.
The main difference between desoldering and kill-switches is that with a switch you can reconnect the microphone and actually use it.
If you ask me, I would consider the feature nice to have, but not mandatory.
I somewhat trust that the OS layers of protection are good enough to prevent microphone from being open without noticing, or at least, make it complicated enough that if you are not a target you realistically won't receive this type of attack.