Quote:
Originally Posted by Farcaster
If you had the server and bandwidth for it, you could make part of your application dependant on a web service that you host. That might work for some types of applications anyway. That way the pirate would have to at least decipher and replace the remote part of the functionality.
|
That's a good idea but not really applicable in this case.