ICSI in The Verge

Is Huawei a security threat? Seven experts weigh in​
March 17, 2018 | Colin Lecher and Russell Brandom, The Verge

Nicholas Weaver notes that "Sabotage can be really, really subtle. There are entire contests around how you make sabotage almost undetectable, such as the “underhanded C contest.” It is even more so in hardware. For example, you could sabotage the cryptographic random number generator so that if you knew the secret you could predict it, but if not, you can’t."