
/usr/share at
Well, first of all, if you're so paranoid, rdrand calls can be disabled by specifying nordrand in the kernel's boot parameters.
Second, he was right. It's not like rdrand was used directly.
Third, given that Windows, Linux and BSDs now all use rdrand data differently, any possibility of a backdoored RNG becomes practically worthless.