And with the Chinese, I'd be shocked if they DIDN'T try.
Sure, maybe Apple and Amazon are fine, but maybe not. More will be revealed.
The concept has always been sound. . . It's a method the CIA has used since, well since computers were invented. Sharyl Attkisson's home iMac computer was hacked by someone breaking into her house and placing surreptitious chips both on the logic board and in the keyboard. The keyboard chips were key loggers, separate from the one's on the logic board and transmitted to a radio receiver attached to an optical line the bad guys had actually installed into her house. The chips added to the logic board also transmitted to the same optical line. They nicely allowed her internet connection to go through the optical cable as well, improving her connectivity. . . but that was for their benefit. . . but adding malicious chips is not new.
They were as obvious as hell when forensic IT specialists examined her computer.
The Obama administration intercepted Angala Merkel's brand new iPhone in transit from Apple to her front door and inserted an extra IC that would transmit everything she said, emailed, and texted on that iPhone to the CIA, because they couldn't crack the iPhone's operating system to do it for them. . . so they had to do it via extra hardware. Again, when it was opened up, the kludge was obvious.
The same in these cases. . . a metal case for the Ethernet connector when untouched ones are plastic? Obvious. EZ to exclude compromised boards. Is that what a professional intelligence agency would do? No. They'd cover the cooling metal with plastic. . . but even then, it would be found.