This is a tricky bit, but IMO, I don't think it would be abused to exploit the DRM of the device. While any new technology can be exploited to do things its not supposed to, I cannot think of anything I'd need to exploit on my Reader that I can't do from my desktop first. It's cool that you've figured out how to do this, and judging from peoples' threads in this group, I think everyone here is responsible enough that they wouldn't abuse your work.
|