EDIT: and would you then also review every commit to make sure nothing bad gets introduced? No, at some point you have to place trust in the vendor, the developers, independent audits, etc.
How do you know you're not living in a computer simulation in which the operators can access your data without any backdoors whatsoever?