Username or EmailPassword
This technique is more widely used than most of people here think.
* Routers clone MAC from NICs to allow them to circunvect old policies of ISP providers restrictions;
* OS emulators and console emulators DO the same - provide lots of "false" answers to programs to clone the environment they emulate (os signatures and etc);
* Also present on remote controls;
* More examples... I´m sure they exist.
Don´t think Apple will have a case to go for on court or, what would be worst, it could trigger a larger battle about what steps should not be allowed on reverse engineering.