Skip to main content

North Korea ‘upgrades’ to copycat version of Mac OS X

north korea upgrades to copycat mac os x red star 140130 redstar background

When we wrote this tounge-in-cheek piece about what North Korea could do to look more technologically advanced than it is, we weren’t seriously expecting the reclusive totalitarian state to make some ridiculous moves to upgrade – it was just a joke. However, given North Korea’s tech track record, which includes the use of Windows XP at one of its rocket control facilities, as well as its status as a nearly failed state, perhaps we should’ve seen this coming.

The newest version of North Korea’s Red Star operating system looks a heck of a lot like Mac OS X. But it’s not. Once again, we shouldn’t be surprised by this copycat maneuver. After all, the previous version of the OS looked quite a bit like Windows 7. Take a look at a screenshot of the previous Red Star release below to see what we mean.

Recommended Videos

 Red Star or Windows 7?

Red Star 7

News of Red Star OS and its existence hit the Web when Will Scott, an American computer scientist who was lecturing at the Pyongyang University of Science and Technology last year, bought a copy and took some screenshots of Red Star in action. It’s worth noting that while this earlier version of Red Star looks like Windows 7, its foundation appears to be Linux-based. The images were then posted online, which you can see here.

 Red Star or OS X?

140130-redstar-applications

You don’t have to stare at the screenshots for long to realize that apps in the newest version of Red Star look incredibly like Apple’s OS X, down to the placement of the Close and Minimize buttons for individual windows. 

140130-redstar-mail

 Perhaps most creepy of all about Red Star OS is its calender, which allegedly indicates that the year is not 2014, but year 103. How’d the North Koreans arrive at that number? It’s been 103 years since the birth of Kim il-Sung, one of the nation’s former leaders.

What do you think? Sound off in the comments below.

(Images via North Korea Tech)

Konrad Krawczyk
Former Digital Trends Contributor
Konrad covers desktops, laptops, tablets, sports tech and subjects in between for Digital Trends. Prior to joining DT, he…
Will my Mac get macOS 14?
MacOS Sonoma.

MacOS 14 is coming and coming soon, and thanks to Apple's big keynote address at WWDC 2023, we now know what it can do, what it's called, and who can get it. The next generation Mac operating system is codenamed Sonoma, and it's bringing gaming to macOS in a big way, as well as improving video calls, and security. It's going to be available for most modern Mac and MacBook users, but there are some legacy systems that are unfortunately being left out in the cold.

Wondering if your Mac can get macOS 14? Here's everything we know about what Macs are and aren't compatible with Sonoma.

Read more
Apple’s macOS Sonoma has a game-changing feature — literally
apple could fix mac game porting wwdc 2023 gaming 1

Apple’s Worldwide Developers Conference (WWDC) was chock-full of new announcements, and it’s fair to say that between the Vision Pro headset and all of Apple’s new Macs, macOS was far from the biggest new reveal. Yet, there was one new macOS feature that could be absolutely game-changing.

That’s because right now, Mac gaming is in a pretty bad way. Gamers don’t buy Macs because there aren’t enough good games, and developers don’t port their games to the Mac because there aren’t enough people to play them. It’s a chicken-and-egg situation caught in a death spiral.

Read more
This critical exploit could let hackers bypass your Mac’s defenses
A hacker typing on an Apple MacBook laptop while holding a phone. Both devices show code on their screens.

Microsoft has discovered a critical exploit in macOS that could grant hackers easy access to your Mac’s most important data. Dubbed ‘Migraine,’ it shows why it’s vital to update your Mac as soon as possible.

Migraine is so damaging because it can bypass Apple’s System Integrity Protection, or SIP for short. SIP is enabled by default on modern Macs and works by sandboxing sensitive parts of the computer from outside meddling. Only processes that are signed by Apple (or those with special privileges, like Apple installers) are allowed to alter something guarded by SIP.

Read more