Re: From the BBC article
Remember, some requests are impossible because they are contradictory rather than actually impossible.
For example, I want to be able to access the company's secure document area from anywhere in the world, from any device without having to log in, but it also has to be secure from everyone else.
Or: I want you to put a back door into your encryption process that only I, and a couple of hundred other government departments, can use.