Z:gnu-www-ja-rms-aj--0a3fae-So what you can see is that pr/en

So what you can see is that proprietary software&mdash;even when there's hardware that's malicious, the software has to make use of the malicious features, so the proprietary software's involved also. And when software's proprietary, it is likely to have malicious features in it to spy, to restrict, and there's even back doors that accept remote commands to do things.