@Wetrix and also debunks the idea that you cant check what closed source softwae does or if it is backdoored