Then there's this: https://www.cnet.com/tech/tech-industry/nsa-secret-backdoor-...
And then there was the Tailored Access Operations group that backdoored hundreds if not thousands of computers and networking gear https://en.wikipedia.org/wiki/Tailored_Access_Operations
And then there's Bullrun where they partnered with commercial software and hardware companies to insert backdoors, specifically in many commercial VPN systems https://en.wikipedia.org/wiki/Bullrun_(decryption_program)
Let's also not forget the backdooring of Windows NT: https://en.wikipedia.org/wiki/NSAKEY
...and Lotus Notes was also backdoored, as well.
Then there's this: https://www.cnet.com/tech/tech-industry/nsa-secret-backdoor-...
And then there was the Tailored Access Operations group that backdoored hundreds if not thousands of computers and networking gear https://en.wikipedia.org/wiki/Tailored_Access_Operations
And then there's Bullrun where they partnered with commercial software and hardware companies to insert backdoors, specifically in many commercial VPN systems https://en.wikipedia.org/wiki/Bullrun_(decryption_program)
Let's also not forget the backdooring of Windows NT: https://en.wikipedia.org/wiki/NSAKEY
...and Lotus Notes was also backdoored, as well.