I am sure they would never put any trapdoors/backdoors into the software allowing them to surreptitiously access it later for nefarious purposes. Like the US intelligence community and cooperating US businesses has in the past for foreign clients, as well as various European intelligence agencies and companies.