Coming back to your original question, here is my (probably not entirely informed, very badly shortened, thus probably not 100% correct) argumentation again x86/amd64 routers, that adds on-top of the power usage arguement:
I'm not sure, that the "possible trust factor" is higher on x86,amd64.
My (perhaps not entirely correct) impression of things:
- MIPS devices don't use "microcode" (here defined as: Software running in the CPU, that in turn represents an ISA-compatible Abstraction, which then executes kernel, userland, etc.
This, to me, translates to: "This platform is easier to audit, because it's hard/impossible? to hide [running] code/implants on it". (For better or worse) (Of course, this makes all those devices susceptible to evil-maid attacks.)
- ARM devices, above some generation, have several layers of code, that executes before u-boot, or whatever bootloader you run. ARM CPUs have also have Trustzone, an established, standard way to run code entirely hidden from the user, outside of the users control. Basically the toolset built-in to backdoor systems, and run code on them once you have right keys/auths.
Some ARM-platforms (some Rockchips I think) come with sources to the ATF, and other "trusted" parts, and can thus be verified to be "kosher" (AFAIU). I'm not aware of any other ARM-verndor/product where this is the case, unfortunately. There may be other reasons for this, but -to me- the major 2 probably are "We are ashamed of the code-quality", and/or "We have stuff in there, that we don't want you to see."
- "Repurposed PCs": Apart from power usage (unless you have a top-of-the-line ULV NUC or similar idling around in a drawer), these are systems with CPU running several generations of abstractions of the real functioning of the CPU. For reasons like "Protected-Video-Path" and others, PC arch is rife with chipset-level user-control mechanisms, that are enforced by chipset/cpu-level components. For historical reason there is a zoo of "desktop management" interfaces, that probably nobody at Intel or AMD entirely understands anymore
On top of CPU-level vulnerabilities/problems you have chipset/mainboard issues like "Can my USB3-controller be used as turing-complete general purpose CPU, if you talk to it in the right way?" What about the DMA-controller, South/East/Northbridge, or any number of auxiliary CPU contained in e.g. the Wifi-Card.
Another facet is "chipset level bugs". Intel especially these last few years have shown, that while their stuff runs fast, they -like all humans- make mistakes, that considerably weaken system security, or performance.
So, in summary of my -less coherent than i'd like- rant: To me, there is no system/platform where I trust 100% for all built-in components, that this system is bug and back-door free, and will remain so, if I update my software regularly (from trusted sources)
I perceive a "repurposed PC" to have a much higher number of "dark corners" and other places to hide an implant/code. Probably hundreds of people of this forum could hide a persistent trojan in e.g. the DVD-drive firmware of that old PC.
On top of bugs/plausibly_deniable_backdoors there is the Hardware/Software in-place by law in many components to support "Lawful interception". I would expect until-proven-otherwise, that most (Intel, broadcom, huawei, etc.) network cards, either through (chipset-)FW, or implemented directly in HW, to have in-band debug/data-exfil-capabilities, if you send the right payload in a packet, and then some byte-code for some execution environment.
So, I may be wrong and/or misled by fake news, but I consider therefore an "old repurposed pc/pc_based_router" to the be the most untrustworthy option among the less untrustworthy alternatives.
I'm happy be to corrected on any point, or clarify thoughts, if written unclearly.