It is not about you and the government, but rather about hackers that found out and are digging for these government approved exploits/backdoors/what-have-you.If they do alter piece by piece different bit of hardware then O.K. but somehow I doubt thats how this works, would be too work intensive and sloppy - error prone.