Right.
As I put it
back in 2015:
Thad wrote:Computers are not magic. They do not know who is using them, or for what purpose.
If Alice can break Bob's encryption, then Bob can break Alice's encryption. If America can break ISIS's encrypted communications, then ISIS can break America's encrypted communications. And, not to put too fine a point on it, if the NSA says it's spying on terrorists, it's actually spying on you.
There is not actually any way to make encryption that is only breakable when bad people use it -- any more than there is a way to make an atomic bomb that will only kill bad guys, since you bring up the Manhattan Project, Secretary Clinton. This is kids-on-a-playground "I have a laser-proof shield that only lets my lasers out but won't let your lasers in" shit.
I also covered the same "it's impossible to compromise on this, it's either secure or it isn't" point that the article does with its "4.5 lights" analogy.