Extra hardware could be hidden inside connectors, or packaged into re-labelled chips that look exactly like what you're supposed to find. The only end to it is if you:
1. stop using computers or depending on them to control anything about your life,
2. or build a computer (and all the necessary tools, etc.) entirely from resources which you either already trust or that you circularly prove are trustworthy (you'll have to do this in a totally secure workshop so that you know nobody tampers with your work before it's complete and you've sealed the computer shut),
3. or just give up on having total trust in your computers.
One thing to point out, that yes, the exploits could be mass produced, but that doesn't mean your machine will be their target. So the people saying that they aren't important enough to be targeted are still kind of right.
https://arstechnica.com/tech-policy/2014/05/photos-of-an-nsa...