Can Privacy and Government Encryption Backdoors Co-Exist or Is It an Oxymoron?