To answer the initial question, can this feature get abused for OSINT? I’m doubtful it can. This is certainly state of the art privacy by design: showing a profile name and picture while preserving the E2E confidentiality (server-side data being stored encrypted) and disabling OSINT availability.
Specifically, the FBI wants us to make a new version of the iPhone operating system, circumventing several important security features, and install it on an iPhone recovered during the investigation. In the wrong hands, this software — which does not exist today — would have the potential to unlock any iPhone in someone’s physical possession.
The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor. And while the government may argue that its use would be limited to this case, there is no way to guarantee such control.
Encrypting our communications is a good step, but we need to do more.