I suppose I should mention that OS backdoors could present a similar problem, but that falls into a mixture of what I'd consider zero-day vulnerabilities and user error (...because it IS user error if you're using a proprietary OS with the expectation that there are no backdoors ).
Long story short: Yes, I concede that technologies like Intel's AMT are a problem for which there is currently no solution (other than avoiding computers that have it, which will become increasingly difficult). However, my point here is that communications privacy is NOT a lost cause, at least not for open source systems. While some hardware is compromised, not all of it is, and hopefully we can get rid of compromised hardware in the future. While proprietary OS's and Android are likely compromised, not all OS's are. While zero-day vulnerabilities exist, they're not so bad that it's inevitable that the NSA will always be able to rely on one to break into any system, bar none. While side channel attacks exist, encryption IS still effective...and a huge thorn in the side of surveillance dragnets when used properly.
Are there attacks and vulnerabilities? Yes. The answer is to address them one at a time, not lie down and give up from being overwhelmed.
Long story short: Yes, I concede that technologies like Intel's AMT are a problem for which there is currently no solution (other than avoiding computers that have it, which will become increasingly difficult). However, my point here is that communications privacy is NOT a lost cause, at least not for open source systems. While some hardware is compromised, not all of it is, and hopefully we can get rid of compromised hardware in the future. While proprietary OS's and Android are likely compromised, not all OS's are. While zero-day vulnerabilities exist, they're not so bad that it's inevitable that the NSA will always be able to rely on one to break into any system, bar none. While side channel attacks exist, encryption IS still effective...and a huge thorn in the side of surveillance dragnets when used properly.
Are there attacks and vulnerabilities? Yes. The answer is to address them one at a time, not lie down and give up from being overwhelmed.