Backdoor access means that tech companies would create a way for government authorities to bypass encryption, allowing them to access private communications for surveillance and investigation. Proponents argue that it helps law enforcement and intelligence agencies prevent terrorism and criminal activities by providing necessary access to information. Opponents argue that it compromises user privacy, weakens overall security, and could be exploited by malicious actors.
Statistics are shown for this demographic
Zipcode
Response rates from 699 Veterans voters.
31% Yes |
69% No |
31% Yes |
69% No |
Trend of support over time for each answer from 699 Veterans voters.
Loading data...
Loading chart...
Trend of how important this issue is for 699 Veterans voters.
Loading data...
Loading chart...
Unique answers from Veterans voters whose views went beyond the provided options.
@9RH228W 9mos9MO
No, but there should be a process whereby such access can be granted if the appropriate federal warrant is given and ONLY for matters of national security.
@9RBBBSQ 9mos9MO
Yes, but access should only be granted in the case of emergencies (it should not be always accessible)
@9T5V4637mos7MO
Only in the use of a committed crime and if there is credible information of threats that would put lives in danger
@B3ZYM5D4wks4W
No, for the sake of Capitalism, Freedom, Federalism, Checks and Balances, and a weak-central government, it should be the companies' choices whether to do so or not
@DylanJMcCombs03 5mos5MO
No, this infringes dangerously on an individual's right to privacy and has the potential for serious misuse.
@9SV9J3J8mos8MO
While it could be helpful, it would be taking away privacy and security which could be used corruptly by those in power.
@9PZ2HB510mos10MO
No, the government should have their own tech to do so or give tech companies the option and negotiate a deal with tech companies so that they are fairly compensated.
@B4P2X3M3 days3D
No, I do not trust that outside parties won’t be able to access a backdoor as well whether through paid access or hacking
Join in on the most popular conversations.