Cryptography, backdoors and the Second Amendment