I know this has been discussed in the past and the response has been that it is not a problem worth worrying about but I have had my game out for almost two weeks, had 18,000 hard earned downloads with the support of some Facebook marketing and have found that around 90% of the in app purchases are being hacked. It wouldn’t worry me too much as I know a very small % of these hacked purchases would be actual purchases, however my game is ad-supported and one of the purchases removes the ads which means zero revenue from those users.
From my research it looks like there is a pretty simple way to do IAP receipt validation in Objective-C but I haven’t found anything that works in Corona. Has anyone successfully implemented this recently? I would probably start with local verification as I don’t have a server (unless something like a bluhost could be set up to do it?).
Also, it seems that in most cases the device needs to be jailbroken to hack the IAP so perhaps a simple approach is to test for files that exist in a jailbroken phone and re-enable the ads if found and block the ability to buy IAP. Again, I have found lots of code to do this in Objective-C but haven’t seen it for Corona. I have pasted some sample code below. Can anyone help me translate it? I am not sure how to check the equivalent file paths in Corona. Many thanks!
- (BOOL)jailbroken
{
NSFileManager * fileManager = [NSFileManager defaultManager];
return [fileManager fileExistsAtPath:@"/private/var/lib/apt/"];
NSURL* url = [NSURL URLWithString:@“cydia://package/com.example.package”];
return [[UIApplication sharedApplication] canOpenURL:url];
}