A very good way to have instant access to all program knowledge, workings, creations, and language. The easy access blueprints to robbing your entirety and wiping you clean.
Then proceed with, "This is our version, new, updated from the ground up, a re-creation of a familiar past creation."
Modern day successes made easy off your backs.
@Betterifyouneil Most of what prevents exploitation of surveillance is that there must be plausible deniability of the surveillance going on if it's not supposed to be happening. It can certainly be happening, but if you find out an action has been taken that could only have been a result of surveillance, it lets on to the existence of it. You better believe it is happening if it can be concealed.