And yet the leaked tools don't seem to have much in the way of hardware-based exploits, which might say something about the feasibility of this kind of thing on actual systems. Obviously it can be done, but it were as pervasive as the tinfoil hatters believe, surely it would have shown up here. No?
The document covers how they put a good amount of effort into ensuring there's not a clear link back to the CIA or relevant parties if one of these things is discovered. I imagine having hardware level vulnerabilities would much more quickly point directly to the only agencies capable of such techniques.
That's sort of my point though. If hardware back doors exist (and I don't argue that they can't!) they're exotic, highly protected and rarely used. They aren't routine instruments of state surveillance.