A backdoor can be meticulously documented, have limited access, include a variety of security measures, and be carefully developed with the best of intentions. But it's still…

…a backdoor.
Gotta love that this is the second paragraph in the Wikipedia entry for Backdoor:

"In the United States, the 1994 Communications Assistance for Law Enforcement Act forces internet providers to provide backdoors for government authorities. In 2024, the U.S. government realized that China had been tapping communications in the U.S. using that infrastructure for months, or perhaps longer; China recorded presidential candidate campaign office phone calls —including employees of the then-vice president of the nation– and of the candidates themselves."

More on this story:

https://reason.com/2024/10/11/chinese-hackers-used-u-s-government-mandated-wiretap-systems/

« "The problem with backdoors is known—any alternate channel devoted to access by one party will undoubtedly be discovered, accessed, and abused by another," David Ruiz of the internet security firm Malwarebytes Labs wrote in 2019. He noted that cybersecurity researchers had been making that argument for years. They've been repeating themselves for years because their warnings appear to fall on deaf ears. »
Chinese Hackers Used U.S. Government-Mandated Wiretap Systems

For as long as law enforcement has sought a way to monitor people's conversations—though they'd only do so with a court order, we're supposed to

Reason.com
@axbom nah. That's a tradesman's entrance. By any reasonable definition of backdoor if you have documented it and secured it, it's no longer a backdoor.

@axbom

The hack is when, not if.

@axbom That sounds like a regular door...
@EndlessMason Not far off, but my understanding is that a government backdoor generally insists on not letting you know who is entering or what they are taking part of.
@axbom Right, all the way up until somebody posts a photo of the tsa keys' biting on facebook