Watch this video on YouTube
Which method is best for testing the existence of backdoors when a third party develops a business application?