Any piece of technology MAY have a backdoor or secondary function you don't know of and can't find out without breaking said device.
Any piece of technology MAY have a backdoor or secondary function you don't know of and can't find out without breaking said device.