"-1" since someone can take your app,
decompile it, comment/shortcircuit the IAP/DRM
and compile it back - as a "cracked" version...

Or if you use any OAuth stuff - find the "secret"
inside the app and then use it to impersonate other users.

On Thu, Feb 20, 2014 at 1:59 AM, Joseph Balderson <[email protected]> wrote:

> +1 totally agree.
>

Reply via email to