re: #323 Charles Johnson
So they are wanting to breaking an encryption method so they can decode sensitive information WHEN THE SITUATION REQUIRES IT.
Am I understanding correctly?