There is no way to tell what a device is capable of unless an expert dismantles it and identifies the components. I don't want to argue, however there is no conspiracy theory about hacks, compromises, and breeches. It is out there, everywhere. We all just do what we want, to try to stay safer (not safe). And to be a little picky, Windows, Nord VPN, Malwarebytes, and almost any service or product you can name, has already been breeched. A search will show dates and details. Check out this THIS ARTICLE for a little information that only scratches the surface of what details are available on device users.