North Korea borrows liberally from Apple's OS X in new 'Red Star OS' updateIn what is reportedly the third major version of the secretive country's homegrown Linux distribution, North Korean software makers appear to have looked toward Cupertino for inspiration.
New screenshots from visiting computer scientist Will Scott show an OS X-style interface complete with a reflective dock, gray-gradient application frames, and blue Aqua controls. The shots were first published by ComputerWorld.
Developed by the Korea Computer Center, a Pyongyang-based information technology research center for the North Korean government, Red Star OS formerly featured a Windows-like desktop. Scott— a visiting professor at the Pyongyang University of Science and Technology— purchased the software at an official KCC retailer in the capital during his stay.
Red Star OS is localized for North Korea, which uses slightly different terminology and spelling than its neighbor to the south. Development is said to target low-powered hardware, requiring only a Pentium III processor running at 800 megahertz, 256 megabytes of RAM, and 3 gigabytes of hard disk space.
In addition to localized variant of WINE, which allows some Windows applications to be run on Linux, Red Star OS contains a customized fork of Mozilla's Firefox browser that can be used to access the country's heavily restricted intranet.
The new operating system is not the first Apple connection to North Korea —late dictator Kim Jong-Il was said to be a fan of the company's products. The U.S. government famously sanctioned the country in 2006 by, in part, banning the sale of Apple's iPod music players to the regime.
On Topic: Mac OS X
- Trade-in coupon: $20 cash bonus when you trade in your old Mac ahead of rumored 2016 MacBook Pros
- LEGO rolls out Macs in the workplace to meet growing employee demand
- IBM deploying 1,300 Macs per week, Apple users need much less support than PC counterparts
- Quicken releases 2017 updates for Mac & iOS personal finance apps
- Adobe issues Flash updates to deal with 'critical' security holes