There is plenty of hardware offering that contains only open source firmware or can be loaded with open source firmware.
As explained quite some time ago on the forum, there is open source bios, and quite a number of (more enterprise grade) motherboards are compatible with it.
It's all a matter of hygiene and practicality. The key to everything is to roll out your own cloud and have a good server of your own, it doesn't have to be expensive or the latest and greatest hardware, it just has to be flashable with open source BIOS. Then you can configure your own secure environment, always departing from the assumption that any user interface device you use with it, is unsafe by nature.
That solves a lot of issues with privacy and security and the elementary protection of your individuality and identity as a human being holder of human rights and as a citizen holder or the liberties guaranteed by your constitution. But it doesn't solve everything. It doesn't solve the fact that certain corporations do more than just provide backdoor entries to your data by getting in to your "unsafe devices" through spyware that has to be presumed abundantly present in all kinds of proprietary hidden code arrangements. If they were only snooping on your unencrypted data, it would be like opening a snail mail letter in an envelope that wasn't closed, there is no excuse for that, but it may be covered by terms of service and the likes. But by implementing keyloggers, which is what Google and Microsoft do quite openly, and others do with less openness, they might intercept your master password for your private encryption keys, and that is the same as opening a closed envelope marked as "private, personal and confidential - do not open!", and that could not be covered by any general terms of service or license agreements, it would require a specific mandate like a power of attorney, which they do not have.
So as long as you avoid systems that reputably use keyloggers, and have a full open source server of your own, you're pretty safe.
Now what if you don't have the infrastructure for your own open source hardware server? No problem! If you arrange a virtual server, and make sure you use an open source virtualizer (plenty of offerings available, from Xenserver to kvm/qemu etc...), you simply use the open source seabios as virtual bios for your virtual server (which is the default). You could rent a server on a machine of a local small host company, which isn't expensive and those guys often really care for their servers. You could also rent a virtual server on the Amazon infrastructure. You could fully encrypt your server, like you can with all linux boxes.
When you virtualize and encrypt, the hardware doesn't even matter all that much if you use open source software and disable the RNG's in Intel CPU's for your encryption.
If you don't want a server of your own, but want to protect your data, nothing is easier to be honest. The open source world delivers some really fine super user friendly solutions.
One solution is to get a smartphone or tablet for which there is an open source ROM available. The basic Android operating system is open source, it's called AOSP. What isn't open source, are the applications provided by Google, and those contain all of the nasty stuff. So you simply don't install those. Even if you use gmail as mail provider, you can send encrypted mail that Google will not be able to read as long as you don't have GApps installed on your device. You can still access Google services through sandboxing applications like Web Apps or Google Apps, which are open source applications made to keep Google's snooping confined to a secured container.
A good arrangement would be:
a "popular" smartphone, not very high end, but midrange, with a well documented SoC for which there are a full complement of open source drivers. Samsung is not a bad choice, STE, some Mediatek chips, etc... look up on github for which chip all open source drivers are known and/or added to the linux kernel. The linux kernel works in such a way that of course it cannot do anything about the breach of security in the radio of a phone, because that sits behind the SoC, but it's very well documented and regulated what interaction the linux kernel permits and executes between what is under the kernel's control and what goes on in the radio. Once it's governed by the linux kernel, you basically have to willingly compromise it with proprietary software to decrease the basic security the linux kernel offers by design.
an open source community developed ROM based on AOSP, with a decent size dev community standing behind it.
no gapps
when there are no gapps, the phone doesn't require you to log in to a google account, in fact, there should be no system-wide accounts. By lack of gapps, you don't have access to the Google Playstore, but you can go to "f-droid.org" with the standard AOSP browser and download the f-droid market client. F-droid contains only vetted open source software, and mentions possible privacy risks with certain applications like Firefox, which won't be supported much longer for that reason anyway (not that you would need it because the standard AOSP browser is actually very good). On the f-droid market, find and install K9Mail and Openkeychain. Openkeychain is super easy to use and will guide you through the process of making an encryption keyset for your mail accounts, that you can then use with K9Mail. This will actually, notwithstanding proprietary radios in your phone (something that tablets mostly don't have to deal with if they use a Wifi radio with open source firmware and drivers, which is most often the case these days), provide you with a secure communication over the internet, that is super easy to set up and use, and requires no prior knowledge at all.
If you want to use other Google services like Drive or Maps, you can do so - under your Google account or not, whatever you want - with GApps or WebApps browser, applications that you'll also find on f-droid.org, that provide an open source sandbox in which you can access Google services without compromising the basic security of your entire device. There is an open source alternative or superlative for just about any Google Play Store application though, from social networks that respect privacy to direct messaging agents or voip or sip clients, but also turn by turn navigation, bank access applications, office applications, and whetever exotic apps anyone would like, all open source.
If f-droid can't keep up, which happens from time to time because they really check everything, which takes some time, and you badly need something that isn't yet on f-droid, there is a good chance that aptoid will have it. Aptoid is not strictly open source, it's commercial, but there is also a good open source offering (better than the Google play store) and they check the code of popular apps and mention it clearly if they have checked and approved an app, so it's advisable to install only those apps from aptoid that have the checked and approved mention in the store.
If you however install GApps or Microsoft Outlook or Word or an Adobe app or an app of your ISP or some other typical Google Playstore app, you should consider your entire device and everything on it compromised, including the master password for your encryption key.
So that's an example of a "very bad" situation, namely a device which contains a proprietary radio (and of course, that can be used to track your location and register your calls, the latter of which is regulated by law and not superseded by any terms of service). Even on such devices, the main thing is to use carefully selected sources of open source software in the entire operating environment behind the linux kernel. Just like with a PC or another connected device, once you're safe behind the linux kernel, which guarantees you an operational environment controlled by you and you alone if you stick to open source software and make wise choices, the only thing anyone will be able to harvest from you is your machine identification, and thus your location on the grid, and the location of the router behind which is your server, or the router of the company that hosts your server, which will teach them nothing. If you've acquired your phone or PC in a small store using cash, or if you've bought it used from someone that doesn't know who you are and have paid cash, and if you've never registered anything, then they don't know that machine identifier is associated with you. That's not bad as far as privacy goes. Of course, one single slip up, like only running a proprietary OS once or the likes, and you're toast if your desire was to keep off the grid completely.
Now in general, I think that a combination of keeping off the grid and staying on the grid represents a responsible and realistic use case scenario. It's not because I don't want anyone opening the letters that I've sent in a closed envelope, that I'm not clearly writing my name and address on the letter in the return address space. People forget that if they go off the grid, they are not exercising their rights, because they are not identifying themselves as a holder of rights. The right to privacy is a human right, just like the liberty of religion, but the rights to individualism and personal freedom and freedom of speech, are civil rights that require the individual to exert them in his own name, as a citizen and holder of those rights. If you're incognito or use a false or assumed identity, you do not hold those rights everywhere in the world. You have to demonstrate that you will not abandon or waive those rights.
The practical aspect of that, is that proprietary operating system and application software is mostly offered by large corporations, that have better access to legal counsel and the way the legal systems work, that means that you don't really have a chance to enforce your legal rights against them. So where it would be ideal to demonstrate that you're not relinquishing your rights by enforcing them as a user of proprietary solutions, the sad news is that this is not a practically feasible option. That's why the only practical solution is to use open source software for that.
The amount of open source software that anyone wants to use, is up to them of course. If you install linux with open source applications in Oracle VM Virtualbox (which is proprietary) on a Windows 10 machine (proprietary with keylogging), you're not protected by the open source, as the keyboard is passed through by the Windows host, thus your data entry in the linux guest is compromised. However, if you use a linux container on a headless virtualization server and ssh into it, the server doesn't really matter all that much, as long as it's a open source hypervizor of some kind. The same goes for other hardware. It's not that big of a deal in the end. People can use Windows to game on a dedicated machine, preferably in a sandbox on an open source virtualizer, but if that's not possible, on a dedicated machine that is considered unsafe and is only used for entertainment. That doesn't mean that you're giving up any rights. It does mean that you give up rights when you use the same machine or environment for your personal stuff, for your communications that you wouldn't publicly expose if the communications would not go through a computer or a network channel. That is just common sense and personal responsibility and choice. The thing that's wrong is not that the proprietary software spies on you, because that's clearly indicated in the terms of service and the EULA's, but rather that people were/are lead to believe that it's safe to use that software, and that the terms of service don't really mean anything. That's what's happening, and that's what's just plain evil about all of the "freemium" services out there. It's basically the same as putting up the sign "Arbeit macht frei", it's consciously misleading people into believing that they will not lose any fundamental rights like the right to privacy and the protection of their personal space and identity, with the sole purpose of making it easier to exploit the people and do away with them after they've served their purpose... and the thing is, even when faced with irrefutable proof that there is abuse and that there is misleading information sent out, a lot of people, if not the majority, will still not believe that evidence, and will disregard it, or even defend it and make up arguments in favour of it. History has proven that over and over again. History has also proven that the only way to escape this is to keep exerting your rights, to take the responsibility to reject the coercion, to inform yourself and make the right choices, not to remove yourself off the grid, but to pride yourself on your rights and the exertion thereof, in the most feasible and practical way.
A few years ago, for most people that used computers, there might not have been a really practical solution to exert their rights, because open source software wasn't as accessible. But right now, there is no excuse any more, as open source software is more accessible than closed source software, it requires less setup, less loss of time, less investment, etc... there simply is no reason not the use open source software, unless of course one would want to publicly relinquish his rights, which of course would be one's right also...