It’s also stupid for other reasons. Encrypted traffic going to a backdoored endpoint is indistinguishable from encrypted traffic going to a secure one. As is traffic that is encrypted twice, once with a secure key and once with a compromised one. This means that bad actors will still be able to communicate securely and their traffic will be indistinguishable from everyone else’s.
It’s also stupid for other reasons. Encrypted traffic going to a backdoored endpoint is indistinguishable from encrypted traffic going to a secure one. As is traffic that is encrypted twice, once with a secure key and once with a compromised one. This means that bad actors will still be able to communicate securely and their traffic will be indistinguishable from everyone else’s.