There is a difference between having the potential of access versus actually having software installed that scans keywords to phone home about.
Wasn't everyone just outraged about apples csam because it could have the potential for intel agencies, like china's to abuse it by claiming political photos were csam?