So, I agreed. Nobody has ever invented a back door that could be exploited.
Then why did you imply that someone could intercept the data flow and descript it?