> The demos and reference implementations are merely intended to
> exemplify fetching and verifying license keys. Cracking the reference
> implementation binary is trivial. We clearly state its use  is at the
> discretion of the developer.

Cracking a reference implementation binary is usually trivial, though
that doesn't mean the example you've given can't used to show how
easily your schema used in the example is easily circumvented. If your
example of usage is extremely easy to do such a thing to, why wouldn't
any other example? Is it just not properly implemented in your
example?

> As for this specific piracy attempt cited in the first post of this
> discussion, we can confirm there has been no compromise of license
> keys on our servers. The attempt clearly didn't exercise the
> principles of licmax since there is no trace of the perpetrator on our
> system.

By stating that you can confirm there has been "no trace of the
perpetrator" on your system isn't exactly a good thing. The whole
concept of circumventing your protection schema would to NOT be
detected. Why would someone attempt to pirate an application with the
idea of being tracked and caught?

>  Our installed customer base regularly endures piracy attempts
> none of which as has ever been successful.

If your stuff is up to par, then feel free to post a *real* example or
a customers product name. I'm sure people will gladly tear that appear
and leave no trace on your servers doing that either :)

-Tim Strazzere

-- 
You received this message because you are subscribed to the Google Groups 
"Android Discuss" group.
To post to this group, send email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/android-discuss?hl=en.

Reply via email to