05-19-2011 08:44 PM
05-20-2011 03:16 AM
Couldn't this vulnerability be used to pirate paid apps? If so, then there's already PLENTY of evidence of mass pirating going on in the Android platform. I don't think it's wise to wait until something is a problem when proactive steps can be taken to minimize the chance of it becoming a serious problem.
Are you talking about 'mass pirating' operations on the Android plaform in general? Or specifically a 'mass pirating' operation to crack open AIR apps to rip-off the swf ?
I know of the former, but that's a much more general problem, and would be an argument against development of any kind of Android app.
But I would like to see evidence of AIR apps spedifically being targeted because of the vulnerability highlighted in this thread. I believe if that was the case then there would be ripped-off Android AIR games being recompiled and appearing for the iPhone and the PlayBook?
01-30-2012 08:39 AM
01-30-2012 08:45 AM
01-30-2012 08:47 AM
01-30-2012 10:08 AM
01-30-2012 11:26 AM
01-30-2012 11:45 AM
In OS 2 (and it might have been there earlier), apps that are side loaded stop working after the debug token has expired. I am wondering how many people would take the time to side load and refresh their tokens every month. If they spend the money on a PlayBook device, I am wondering why they don't have the $25-$50 or so in total price of apps that a normal consumer might purchase. Yes, any opportunity to shut down illegal sites should be taken, because the scale could get out of hand. Just seems like a real pain to get an app...
I have loaded my signed app onto my son's device (which does not have a debug token installed) and it remains operational indefinitely. Same thing on my own device after the debug token expires.