You don't get the point of Purism's product line. The focus of their offering is freedom. The rest are peripherals---and more than decent ones, those are. Given their size, you can't expect them to compete with the big players in prices. But disabled ME and a modifiable laptop is worth that price.
The totally closed firmware and ROM on the m.2 nvme SSD is no more or less open than a modern wifi card with full open source Linux kernel driver support, which has a closed ROM running it.
For some reason wifi vendors typically ship devices without any radio firmware at all, but leave it up to the driver to load it. Rendering the device 100% useless without loading some external proprietary blob.
A key difference is that a hard drive can't secretly send information out. I'm fine with an isolated component the rest of the architecture can treat as a black box (even sending only encrypted data to it). But the wifi chip can easily build its own IP packets and leak a bunch of information to the internet or it can have an easily exploitable backdoor.
a hard drive is a huge source of attack vector. In particular if you're running full disk encryption with a very tiny unencrypted ext2 boot/grub2 partition, malicious firmware on a disk can intercept the plaintext keystrokes for a passphrase-unlock on FDE. This is a known intelligence agency attack vector.
This specific platform has all of the tpm module feature set disabled, no? Since the code running inside the tpm is proprietary and closed. To the best of my knowledge super gpl zealot users rarely choose to store a key in the tpm for full disk encryption unlocking purposes.
The SSD runs its own proprietary firmware that controls the raw disk device itself. If it wants to insert a blob of code into your bootloader or grub2 that can do keystroke interception on a full-disk-encryption unlock, it can. This is the same idea as a technique used by intelligence agencies with a typical "evil maid" attack.
Yes, I was more curious if a malicious actor (the hard drive) with access to the nvme bus could manage to exfiltrate data directly via the network interfaces without involving the OS.