The court proceeding on the FBI’s request for an order requiring Apple to help it unlock an iPhone used by one of the San Bernardino terrorists was rendered moot this week, after the FBI reported that it had successfully unlocked the phone without Apple’s help. Apple is now demanding that the FBI inform it of any vulnerability it found in the iPhone hardware or software. So Apple, which in its briefs decried the government’s attempt to “conscript” Apple engineers to assist the government in protecting public safety, now claims the right to conscript the FBI to serve the company’s interests. Deepening the irony, Apple reportedly does not pay “bounties” to hackers to learn about bugs in its products, unlike many tech businesses. So it wants to obtain, on the taxpayers’ dime, the sort of information its competitors pay dearly for. And Apple could get exactly what it wants ‒ in 2010, the government formalized a “Vulnerabilities Equities Process,” an interagency group that determines whether the government should disclose to the relevant information technology company a “Zero Day” (i.e., previously undisclosed) vulnerability in its product, or keep the bug a secret in order to utilize it for intelligence gathering or law enforcement investigations.