> If the US Government forced Apple to add other entries to the hash table, this would constitute a warrantless Government search of the private physical property of US citizens. This is a clear-cut, unambiguous breach of the 4th Amendment.
There's no reason not to assume this isn't already happening, being closed source and proprietary. The question to ask is, what are we going to do about it?
If you take that line of argument, you must also accept that you have no reason not to assume that binary distributions of Android and Windows haven't been doing similar things for the past decade.
I agree with you in that I don't think the problem is the closed-source aspect. Closed source software can still be audited (with difficulty). The problem is that the source material for the hashes can't be audited, even when we know exactly how the system works.
There's no reason not to assume this isn't already happening, being closed source and proprietary. The question to ask is, what are we going to do about it?