>>993
What he said.
Although personally I bit the bullet and usually use a *20 series. You can go as late as *30 and retain the old keyboards, ThinkLight, etc.
It's possible to mitigate a lot of the other stuff via a BIOS flash, which is strongly encouraged.
But you do technically need to worry about IME. Still, I'd rather the NSA have my backdoor than China. I feel confident that their backdoor isn't nearly as useful as it would be if I were some pleb running Windows with unencrypted files, but who knows. If you're that paranoid about it then you definitely want to go older. Pre-IME Intel chips. Perhaps last-generation IBM or first-generation Lenovo, when China's ability to modify advanced designs was basically non-existent and the best they could do was clone for cheap.
Reminder that it's still your responsibility to minimize attack surface, and a lot of these rootkit-tier backdoors still need to inject code into the OS to be effective due to design limitations.
This means install Gentoo and go full-minimal if possible. Or Arch if that's your thing. The less standard your computing environment the harder it is to inject code.
IME can also theoretically be disabled or severely neutered.
https://hackaday.com/2016/11/28/neutralizing-intels-management-engine/
If the IME can't have network access, and the BIOS is libre and doesn't support CompuTrace, then you've effectively killed the best backdoors.