That’s very easy.
Step 1) suppose the secure element is backdoored
Step 2) stay air gapped forever
Step 3) input your own entropy from dice rolls
Step 4) after signing a transaction, verify the transaction signature on your own node before broadcasting (which I believe but am not certain is...