For example, a backdoor implanted in the disk firmware would be virtually undetectable for the vast majority of users.