View Single Post
Old 07-05-2010, 03:43 PM   #30
tompe
Grand Sorcerer
tompe ought to be getting tired of karma fortunes by now.tompe ought to be getting tired of karma fortunes by now.tompe ought to be getting tired of karma fortunes by now.tompe ought to be getting tired of karma fortunes by now.tompe ought to be getting tired of karma fortunes by now.tompe ought to be getting tired of karma fortunes by now.tompe ought to be getting tired of karma fortunes by now.tompe ought to be getting tired of karma fortunes by now.tompe ought to be getting tired of karma fortunes by now.tompe ought to be getting tired of karma fortunes by now.tompe ought to be getting tired of karma fortunes by now.
 
Posts: 7,452
Karma: 7185064
Join Date: Oct 2007
Location: Linköpng, Sweden
Device: Kindle Voyage, Nexus 5, Kindle PW
Quote:
Originally Posted by HarryT View Post
They don't vet it in the sense of reading the source code - they do vet it in terms of scanning it to ensure that only published APIs are used. Eg, there is no published API to reformat the file system on an iPad - any app which attempts to do so via an unpublished interface is probably up to no good.
Are you not running machine code? Can you not encrypt you code so you cannot detect what it will do? Why is not methods used to break into computers possible to use to hide code that is not allowed?
tompe is offline   Reply With Quote