@tante I'm in favour of it irrespective of the label. I strongly recommend the application of the principle to the full stack from the raw materials up. Backdoors have been at minimum suspected at the level of CPU, device, mainboard etc. & other hardware. Firmware & operating system kernel code is also suspect esp. insofar as it's closed source but by no means limited to it. The EU has the EUV lithography machine manufacturer; it could use it for the sake of getting the berserk USA comprehensively out of its computing stack, though it might carry a price premium.