Re: Why would Apple (or anyone else) want to be in the loop?
This inevitably is a problem for escrow schemes, and was a criticism of Clipper and its data analogue Capstone. It is an inherent vulnerability of key escrow, just as is exposure of a private key in a public key system. In Ozzie's scheme, the repository in one possible implementation contains private keys matching public keys on the devices. The difference, as Green observes, is that the opportunity to get all the keys wholesale would make the repository a high value target for attacks.
The keys in the repository, if held by the manufacturer, would not have to be delivered to either domestic or foreign law enforcement or intelligence agencies. They would be used to decrypt the encrypted key those agencies obtained from the device and sent for decryption.