Maybe you can disconnect the mic & camera, but since most modern audio chips are programmable it's possible to 'listen' to the speakers (think about it: a speaker is sort of a microphone in reverse). When a nation-state level player decides to eavesdrop there are many possibilities a hardware disconnect won't fix (some involving not tampering with your laptop at all)
A hardware disconnect fixes no problems most users have that's not solved by having a mostly secure OS with clear indication of recording status, while introducing some friction (like having to search for the magic button to turn the camera on when needed).
When something titled that way finally shows up I still won't trust it...
Pretty sure China has hacked all of the telecom companies to know which IPs (Tuya streams) would go with which Experian® profiles (https://www.fbi.gov/news/stories/chinese-hackers-charged-in-...) too, though such a hack probably involves somethingStupid™ like keyboard firmware injected into customer service terminals at multi-provider offshore customer/provisioning centers. (Those account number to DHCP lease servers/loggers are probably the least protected part of the consumer networks...BigTech has erybody thinking it's about surveillance capitalism, when it's really about surveillance period.) Apple's iCloud Private Relay service doesn't help much here either, as "Tuya" can associate the Apple-device running the app with the IOT devices that are streaming through the "Tuya" platform, providing a pretty good estimation of the identity of the user of the app on the Apple-device (which, of course, can be passed along in realtime to other apps in the "Tuya" family, even as Private Relay is rotating the IP addresses, so long as the "genie" like app is running in the background enough to phone home with an IP update packet).
Just fluff.