OS X requires a decryption key embedded in the System Management Controller in order to run.
A key that apparently requires no decrypting to get access to. In other words, OSX requires a key, to be sure, but the key isn't encrypted and you don't need to decrypt anything to get at it. It's just a key. An analogy to the way that key can be intercepted would be like me shouting a secret password to a friend across a room wherein there are other people milling about. They didn't need to do any tinkering or dodgy investigation to get to the key; they just had to understand English and have ears.
Psystar would still be guilty of contributory infringement. Not much difference.
First of all it's important to make clear again that I don't know how Psystar does things so talking about this as if it's what Psystar is doing may mislead people. For that reason, I'm going to stipulate a hypothetical company doing what I described earlier–Systar.
Moving on...I don't think contributory infringement is quite so clear. Contributory infringement requires two things (so I've learned): (1) knowledge of the infringing activity, and (2) a material contribution to infringement.
Systar may reasonably believe some people that buy their computers, in the method I described above, might commit copyright infringement; but, that's not the same as knowing that copyright infringement has occurred in specific instances respecting computers they sold, or even generally.
Condition (2) apparently involves a stronger connection to the activity–standing in the relationship of causing or inducing the infringement. This is where things get hanky, but I think there's still a way to navigate Systar's liability here.
(1) Systar makes no no claims about whether OSX is installed (in the usable sense and not the backup sense) on the computers they sell. They merely assert that their computers are compatible with OSX. They simply don't sell computers with OSX already installed.
(2) When customers buy a computer from Systar they can also choose to buy a retail copy of Snow Leopard (which Systar legally obtains).
(3) Customers are presented with the option to have Systar make a backup copy of the retail copy of Snow Leopard they want included with their computer purchase, compliant with copyright law. The backup is stored, in machine readable form of course, on the hard drive accompanying the computer the customer intends to purchase.
(4) Customers can also request the pre-installation of an EFI bootloader to a seperate partition.
(5) The options in steps (2), (3), and (4) are all presented to the customer as separate options.
(6) When the customer turns on the computer, they are presented with information that says that if they boot into the Snow Leopard disc backup and install Snow Leopard, they will be violating Apple's SLA and Systar advises them to not breach the terms of SLAs and that the backup copy of Snow Leopard on the hard drive in the computer is for backup purposes only.
If the customer does install Snow Leopard, appearances to the contrary, it seems difficult and much more controversial to assert or show that Systar's actions satisfy conditions (1) and (2) of contributory infringement. In a related way (not perfectly analogous, but analogous enough), this seems to be sort of how ISPs get out of contributory infringement.
But, lets just assume that Systar's actions relative to their customers action of installing Snow Leopard constitutes contributory infringement. No doubt, if that's the case they can be sued and made to pay damages or whatever. However, interestingly, I don't think their actions would constitute criminal behavior (not that that's going to be much consolation if they have to pay loads of money), but interesting nonetheless. I think their actions wouldn't be criminal because the copyright was infringed after the legal sale of the retail Snow Leopard copy and the accompanying backup, and criminal infringement, as far as I can tell, is when the infringement occurs and then the selling occurs so that the financial gain was made off the infringement. In this case, financial gain is made off a regular-old-sale that just happens to later involve somebody using the content of that sale to commit infringement.
So nobody misunderstands what's going on here, this is the game I'm playing. Discover, if possible, how a company might facilitate the use and installation of OSX on it's own computers without breaching any contracts, violating any other laws, or making itself liable for civil action against it. Maybe it's not possible, maybe it is; I'm just noodling it out. What I'm not trying to do is discover a way to install OSX without at least breaching any contracts. I'm granting at the outset of all of this that installing OSX on non-Apple computers just is a breach of contract, end of story. I'm also assuming that the judgment in MDY v Blizzard is correct and that any breach of contract (in terms of a term violation of an SLA or EULA) revokes the license to use the software to which that license applies. Additionally, I'm assuming that the physical copies of computer software that one buys in the store are owned, but that the software on those physical copies is not owned–it's licensed.