@feld @EnfysBook If you don’t trust Google or Apple at that level, why use an OS that can literally do what it wants: not just through the keyboard APIs, but also through the a11y APIs, through screen reading, unrestricted memory access, etc.?
It’s one thing to limit potential information leaks. It’s another to assume malicious intent.