Agree with this. Makes me think that the code-breakers themselves must be using specialized hardware to protect their own side-channels. But for this to be feasible you need to have big chipmakers in on it. Fascinating to consider
No need, data collection is a different function than exploitation. People that are turned into assets are often not even aware how they are being used.
I once insisted I could be bribed to avoid the escalation of coercion as a joke, that was funny until someone actually offered $80k for my company workstation one day.
It is a cultural phenomena, as in some places it is considered standard acceptable practice.
My advice is to be as boring as possible, legally proactive, and keep corporate financial profit modes quiet.