The analogy is off in a meaningful way: you're using a "fake ID" to get the locksmith to give you a copy of your own house key because the locksmith won't accept your real ID. No prosecutor is going to throw the book at someone trying to access their own house.
Apple claims I'm in control of my messages. They're on my devices. Apple refuses access to Android. Why can't I use technology to make my messages work on Android? They're my messages!
You might respond that this impacts someone else. For example, me using Beeper means that anyone messaging me is impacted. My counterpoint is that the user is always the weakest link. I can share messages sent to me with anyone I like, and that's legally fine to do. So why can't they be shared with a different software service that I trust? (People use all kinds of 3rd party email clients which could be untrustworthy, and yet we still mostly trust email.)
Apple claims I'm in control of my messages. They're on my devices. Apple refuses access to Android. Why can't I use technology to make my messages work on Android? They're my messages!
You might respond that this impacts someone else. For example, me using Beeper means that anyone messaging me is impacted. My counterpoint is that the user is always the weakest link. I can share messages sent to me with anyone I like, and that's legally fine to do. So why can't they be shared with a different software service that I trust? (People use all kinds of 3rd party email clients which could be untrustworthy, and yet we still mostly trust email.)