I’m not exactly sure what that has to do with disputing the quoted sentence. It’s actually what I was talking about. Everybody knows that Apple has "internal APIs," giving them access that non-Apple software does not have. This does make it difficult for independent developers to offer competing functionality (this has happened with me), but I have not felt that Apple has deliberately targeted competition. It's just that they have the ability to deliver something that serves the user, and their internal access gives them an advantage.
As an independent developer, I can certainly understand why I would not be allowed to access some of these private APIs, and I don't feel that it is because Apple is afraid of any competition from li'l ol' me. I have always assumed that it's because access at that level may bypass some security methods.
The approach he described is consistent with non-malicious failure to turn a new API into something robust, reliable, external, and well documented. If you’ve got a hot new way to move bytes the long term stability of the API is a real concern. You break things if you change it.
As an independent developer, I can certainly understand why I would not be allowed to access some of these private APIs, and I don't feel that it is because Apple is afraid of any competition from li'l ol' me. I have always assumed that it's because access at that level may bypass some security methods.