Lie. Here is the context to which you replied that packages are signed by Apple and the developer: "People using an iOS device can never be sure they are installing the secure app they wanted to install or some switcheroo."
As you've admitted, Apple can do the switcheroo.
> They don’t say anything of the kind.
Lie. Here's what they said:
"All of the major iPhone vendors in China do this by using an enterprise enrollment certificate to adda new certificate to the code signing certificate chain of trust.
"And then when they repackage the government malware, they do so by signing it with the enterprise signing certificate, which allows them to bypass the Apple signing certificate for code execution on the device."
> A browser certificate
Lie. See above.
>> Where that key exists is irrelevant.
> It is relevant.
Then why don't you explain why where the keys are is relevant to whether something is possible instead of ignoring where the keys are and saying the following?
> The Chinese key iOS devices trust doesn’t enable them to MITM App Store packages..
Lie. See above.
> You have pointed to a key which can’t sign packages
Lie. See above.
> You have claimed China can MITM iOS packages but you have provided no evidence to support this claim.
Lie. See above together with my description of how to use that key together with the Great Firewall and a proxy.
> Also false. You said the link to the Apple employee’s statements supported this claim.
Lie. I used the Apple employee's statements to say that they can, not that they do. Quote: "they can [emphasis added] replace the Signal package with a compromised one."
> Me: “There is literally no evidence anywhere to support the idea that China is signing iOS packages delivered to devices.” You: “I provided link from an Apple employee saying as much.”
I sort of understand how you would be confused. The statement I was responding to here was not about China MITMing the App Store but about China signing iOS packages delivered to devices. The quote above shows that they do.