This completely depends on your threat model. Please do not force your own threat model on other people. I do not trust non-verifiable software written by huge corporations. I avoid it as much as possible (which means not always!).
You have the right to follow a different threat model, but you do not have a right to claim that companies offering me a transparent system fitting to my threat model “cross an ethical line that really shouldn’t be crossed”.