"-1" since someone can take your app, decompile it, comment/shortcircuit the IAP/DRM and compile it back - as a "cracked" version...
Or if you use any OAuth stuff - find the "secret" inside the app and then use it to impersonate other users. On Thu, Feb 20, 2014 at 1:59 AM, Joseph Balderson <[email protected]> wrote: > +1 totally agree. >
