What are you planning to use it for (laptop suggests possibly a workstation?)
And what is your threat model? Who is the most likely attacker - govt? Crypto theft? Supply chain?
What are you planning to use it for (laptop suggests possibly a workstation?)
And what is your threat model? Who is the most likely attacker - govt? Crypto theft? Supply chain?