

crypto ignition keys (CIKs) are just setup tools to load bootstrap keys into a device.
like, for instance, if you’ve just unboxed a secure telephone, there’s no keys in it, so you have to use a CIK to load keys/ciphers into the phone before you can make calls from it.
the private sector doesn’t use them much, but NSA invented them and they’ve been a staple of IC infra for decades.
right, you said it was stupid because:
I’m saying that scenario wouldn’t be possible. for the enemy to exploit a backdoor like this, they’d have to either:
I don’t think any of the above are very likely, or at least not likely enough to outweigh the strategic benefit of being able to ground your enemy’s air force in the (hitherto unlikely) scenario one of the US’s customers became its enemy. so I don’t think it’s stupid, and I don’t think I straw-manned you.