@nelson Define "against".
The binary blob has features that let you do more than the official API does.
If your code exposes these capabilities outside, you're in for a nasty surprise, as you may have not factored these capabilities into your threat model. Otherwise - nothing changes; there are features there that you never used cause you didn't know about them, and they still remain unused in your code.
But now that you know about them, you may want to use them creatively in your projects :)