ONLY FOR PEOPLE (such as those invited) WHO WANT TO KNOW:
(Even VirusTotal marked this software as safe)
When dealing with software like this one under the
MIT License — especially from a multinational company — be cautious.
The MIT License is extremely permissive. This means that a company like
Microsoft — which distributes open-source software, owns
GitHub, and controls the
Winget package system — has broad legal freedom, including the technical ability to interact with your system remotely without your direct knowledge.
"Even if a program is said to be under the MIT License, the author is not required to publish all of its source code. Critical parts may be excluded from GitHub and remain invisible to the public."
So, when you run this software in
Administrator mode, Microsoft can list all the processes you are running
in real time. This means every feature here under could technically be used against you for various purposes — until you decide to uninstall the software under MIT.
| Feature | Potential Risks |
|---|
| into Administrator Mode | Deep system modifications, execution of code with elevated privileges |
| if the Mouse Without Borders is activated | Risk of remote access, unsecured clipboard/file sharing |
| if Advanced Paste is used (AI) | Uncontrolled sending of data to external services |
| if All Modules is Installed by Default | Unintended activation of unnecessary or risky features |
But note:
MIT licenses are not revocable, no matter the version. This kind of license can remain intrusive even after uninstallation.
Also, according to Microsoft’s own
EULA, you are
not the owner of the operating system — you only own the license to use it.
that means,
even if you use a firewall from windows with notifications, it may fail to tell you exactly which IP addresses are being used to connect to your machine.
Why ? Microsoft also controls the
MpsSvc (Windows Firewall service), and this lack of transparency is why you should remain alert.
Key legal points for non-technical (“lambda”) users if you encounter problems with such software:
If any one of these four points is not met, you could have a strong case in your favor.
- Visibility of the license → Must be clearly shown before use. Simply putting it in uppercase in a LICENSE file may not be legally sufficient.
- Timing of the license → Terms introduced only after download or installation may be invalid.
- Consent to the license → If you never saw or explicitly agreed to the license, some of the company’s protections may fail in court.
- Abuse of the license → Clauses that are overly one-sided or strip away too many user rights can be invalidated by a judge.
Most important precaution for a MIT :
Always create at minimum a
system restore point — or better, create a
full OS clone on a USB drive (“freeze” your system) rather than relying solely on restore points.
Why? Microsoft also controls
VSS (Volume Shadow Copy Service).