Encryption > Glossary > Encryption backdoor
What is an encryption backdoor and why is it dangerous?
Encryption keeps your data private, but backdoors weaken that protection. Whether through investigations or legal mandates, governments push for encryption backdoors to break into private communications. Unfortunately, there is no such thing as a backdoor that only lets the good guys in.

What are encryption backdoors?
An encryption backdoor is a deliberately built-in way to bypass encryption. It describes a system that provides special to access encrypted data for approved parties. Essentially, it gives law enforcement a master key to encrypted messages. Governments often frame this as "lawful access" because it's designed to let authorities decrypt data when needed.
Typically, online data is encrypted using TLS, which handles encryption of data in transit. Once the data arrives to service provider — like Google, Dropbox, or Facebook — it is decrypted and then re-encrypted on its servers using encryption keys they control. This means it can access your data, so an encryption backdoor isn't necessary, as governments can compel the provider to hand it over.
In end-to-end encryption, data is encrypted on the sender's device and isn't decrypted until it reaches the recipient's device. The service provider — like Proton or Signal — never has access to the encryption keys, so it can't decrypt anything, even under legal order. That's where law enforcement and policymakers push for encryption backdoors.
Encryption backdoors vs. backdoor attacks
It’s important to distinguish encryption backdoors from backdoor attacks. An encryption backdoor is a feature intentionally built into a system for access under certain conditions — when required by law enforcement, for example — and that applies to all users. On the other hand, a backdoor attack — like the one orchestrated by Salt Typhoon, is a hidden vulnerability introduced by hackers that they use to gain access without detection.
If attackers discover an encryption backdoor, they can exploit it in the same way they’d use a planted backdoor. The difference is that the encryption backdoor was already there by design.
How does an encryption backdoor work?
Encryption works like a lock on your hotel room: In standard encryption like TLS, you hold the key — but the hotel manager (the service provider) keeps a spare and can open the door if the police ask.
With end-to-end encryption, on the other hand, only you have the key, so no one else can enter. An encryption backdoor is when a legal entity (like law enforcement) asks the manager to create a master key that opens every door. Once such a key exists, everyone, including foreign governments and hackers, could try to steal it.
Types of encryption backdoors
Depending on the design, this encryption backdoor can take different forms.
In a key escrow system, the encryption keys are stored by a third party, like a government. If law enforcement gets a warrant, they can retrieve the key.
In client-side scanning, your own device searches your files and messages before they’re encrypted and reports flagged content. It’s like the hotel manager inspecting everything you bring into your room and taking notes, even if the door stays locked.
An encryption backdoor example
In the 1990s, the US government introduced the Clipper Chip(new window), a chipset to secure landline communications. Each chipset came with its own cryptographic key, but a copy of that key was placed in a government database using key escrow. The idea was that if a government agency obtained the legal authority to intercept certain communications from a device with a Clipper Chip installed, it could request the key and use it to decrypt the conversation.
Security experts warned that storing keys in escrow created a single central point of failure, and privacy advocates objected to the idea of universal government access to private conversations. In response, developers released strong public encryption tools like PGP, PGPfone(new window), and Nautilus(new window). Within just three years, the Clipper Chip was abandoned.
Who wants encryption backdoors and why?
Governments, law enforcement, and intelligence agencies are the strongest advocates for encryption backdoors as a way to expand access to digital communications. Agencies argue that they face a “going dark” problem — even with a court order or warrant, strong encryption can block access to critical evidence they can use to gather intelligence and investigate crimes.
This pressure often translates into legislation — such as the UK’s Investigatory Powers Act and Australia’s Assistance and Access Act, which give authorities powers to demand that companies create new ways to break end-to-end encryption and provide “lawful access” to private data.
Why encryption backdoors are risky for everyone
A master key is a hacker's dream
If there’s one master key that unlocks millions of accounts, attackers will hunt it down.
A compromised encryption backdoor could give bad actors access to your bank account, personal messages, and other sensitive information.
History shows even intelligence agencies can’t keep their master keys safe — for example, the CIA and NSA had hacking tools stolen in 2017.
Weaker security for critical systems
Encryption protects privacy in everyday life — from bank accounts to hospital systems.
Weakening that protection with backdoors endangers businesses and critical infrastructure.
For instance, in 2017, hackers weaponized an NSA exploit to launch a ransomware attack that infected over 300,000 computers in 150 countries.
The UK’s National Health Service (NHS) was crippled, delaying hospital care and risking lives. The exploit existed only because the NSA kept the vulnerability secret rather than disclosing it to be patched.
Backdoors allow mass surveillance
Governments may also misuse encryption backdoors. For example, in 2015, Juniper Networks discovered two backdoors(new window) in its ScreenOS firewall, widely used to protect corporate and government systems. One backdoor allowed hidden administrative access, while the other enabled attackers to decrypt virtual private network (VPN)(new window) traffic. At least one of these vulnerabilities seemed sophisticated enough to be planted by a nation-state actor.
If democratic governments like the US are willing to spy on citizens without a warrant, authoritarian states like China, Russia, or Saudi Arabia are even more likely to use backdoors to persecute journalists, dissidents, minorities, or anyone the regime targets.
Proton will never break end-to-end encryption
Proton will never weaken encryption with backdoors. We’ve proven this in practice — resisting government pressure in countries like Russia, China, and India. In 2021, we successfully challenged attempts to weaken email privacy in Switzerland.
We built Proton to give people control of their data in a world where governments and corporations keep trying to erode it. And because political landscapes can change anywhere, Proton integrates protection into the technology itself:h
End-to-end, zero-access encryption means we can’t read your data, and we can’t hand over to governments or law enforcement what we don’t have.
Our apps are open source and regularly audited, so anyone can check that we’re doing what we promise. We're certified under ISO 27001 and attested under SOC 2 Type II.



