North Korea's Apple Obsession Brings New Meaning to the Phrase 'Walled Garden'

Image: KCNA

The Democratic People’s Republic of North Korea is not known for embracing outside influences. But the country’s ruling elite are such big fans of Apple that North Korean technology has been designed to mimic hardware and software developed by the company. And Pyongyang’s admiration for Cupertino apparently goes much deeper—and darker.

New details from the peninsula suggest that Kim Jong Un’s regime is taking cues from Apple in building security features to surveil and suppress the North Korean people. Specifically, the “Red Star” operating system used on North Korean computers and cellphones comes with software that prevents users from installing unauthorized apps. According to the Associated Press, experts say the idea came straight from Apple:

Outside experts believe a program similar to what Apple uses in its OS X and iOS is believed to be the basis of the booby-trap that thwarts attempts to disable security functions in Red Star. It’s now a staple on North Korean phones. And by 2014, all mobile phone operating systems had been updated to include the watermarking system to reject apps or media that don’t carry a government signature of approval.

It’s the same mechanism used by Apple to block unauthorized applications from the App Store, but in North Korea’s case serves instead to control access to information.


With Steve Jobs’s reputation as an authoritarian in mind, the idea that a dictator would use strategies similar to Apple’s “walled garden” in order to censor information seems oddly appropriate. Of course, one could argue that Apple uses this type of blocking software to keep malware and broken apps off of people’s phones, and that’s a good thing. The North Korean regime uses the technology as a form of thought control, and that’s a bad thing.

A North Korean boy uses a computer at the Sci-Tech Complex in Pyongyang. (Image: AP)

We’ve known for a long time that Kim Jong Un is an Apple fan thanks to photos showing him using devices like the iMac and the MacBook Pro. The extent to which Kim Jong Un and his henchmen are applying Apple’s ideas to North Korean technology remains vague, however. We do know that North Korean companies are eager to incorporate Apple’s hardware and software designs into their own products. Earlier this year, one such company released a tablet called “iPad,” and images of North Korean-made iMac clones have been floating around since 2015. The government-built operating system mentioned above also looks almost identical to iOS and OS X, from the app design to the “spinning beach ball” wait icon.

Despite their glossy exterior, however, these Apple-inspired products are also built to be surveillance tools. The average North Korean citizen doesn’t actually have the capability to view regular web pages when connected to the internet. They can only visit government-approved sites on a small intranet called “Kwangmyong,” which roughly translates to “light.” This intranet has just 168 sites, and the government is also always watching, thanks to some special code in that OS X-inspired operating system. Here’s the AP again:

Any attempt to change its core functions or disable virus checkers results in an automatic reboot cycle. Files downloaded from USBs are watermarked so that authorities can identify and trace criminal or subversive activity, a security measure that takes aim at the spread of unauthorized content from South Korea, China and elsewhere.

Red Star also uses a trace viewer that takes regular screenshots of what is being displayed. The screenshots can’t be deleted or accessed by the typical user but are available for checking if a trained government official decides to take a look.


This all sounds like some dystopian sci-fi novel, where everyone stares at the same gadgets not realizing that the thought police are on the other end staring right back. It’s also one of any red-blooded Americans’ worst fears when it comes to Silicon Valley’s relationship with privacy. Companies like Apple and Google know where we are and, roughly, what we’re doing at all times. Facebook apparently knows what we’re going to do next. But we let it happen, because we trust these companies not to behave like authoritarian regimes hellbent on staying in power.

North Koreans inspect a tablet for sale at a market in Pyongyang. (Image: AP)

Maybe it’s not all that different, though. Maybe Kim Jong Un and his small army of obedient developers were able to build all of their scary surveillance devices because companies like Apple showed them how. It’s hard to know exactly how much inspiration the supreme leader took from guys like Steve Jobs and Tim Cook.

But one thing’s more glaringly true than ever: Apple knows how to build walled gardens—and it’s so damn good at it that actual dictators are borrowing ideas from iOS and OS X. That’s a frightening reality in and of itself.



Share This Story

About the author

Adam Clark Estes

Senior editor at Gizmodo.

PGP Fingerprint: 91CF B387 7B38 148C DDD6 38D2 6CBC 1E46 1DBF 22A8PGP Key
OTR Fingerprint: D9330D9B 6CF5E271 7FAC6194 DAA9B51B E09A99B2