I favor strategies that encourage industry to include some sort of key recovery capability in their systems which would also address user requirements for access.
Conversely, terrorists who are motivated to cause violence seem to lack the capability to cause that degree of damage in cyberspace.