in reply to CryPerl.
We also have a fairly sophisticated authentication and registration mechanism, and the logs have shown us that while people certainly try to authenticate the one copy a number of times, no-one has yet succeeded. I doubt it is through lack of ability, but more because the people wanting bootleg copies just won't pay the hackers enough for them I suspect.
Maybe if we had a killer app that was wanted by hundreds of thousands of users, the situation might be different. But right now it is hard for me to justify spending what might turn into tens of thousands of dollars of development time, placing us in a proprietary environment with all the maintenance headaches that would involve, to prevent a few $1500 thefts.
|
---|