Key Escrow?
Many different needs/desires: intelligence, law enforcement, corporate key recovery, personal file recovery, personal privacy.
Can we reconcile these needs?
Do we know how to build – and run – such systems?
Do they scale? Are they secure?