Quote:
Originally Posted by HarryT
They don't vet it in the sense of reading the source code - they do vet it in terms of scanning it to ensure that only published APIs are used. Eg, there is no published API to reformat the file system on an iPad - any app which attempts to do so via an unpublished interface is probably up to no good.
|
Are you not running machine code? Can you not encrypt you code so you cannot detect what it will do? Why is not methods used to break into computers possible to use to hide code that is not allowed?