This does not close the attack vector of someone intercepting the device before you get it and surreptitiously installing firmware with a backdoor.