SlideShare a Scribd company logo
1 of 12
“Piracy in the App Store” Adapted from Presentation by Greg Yardley at 360|iDev
Application Piracy Added to Pinch Media to reduce customer support “Hey, your stats are broken!”
Typical Pirate Lifecycle App cracked and distributed Low but significant piracy continues 2-3 weeks of high activity
Prevalence of piracy Just over 60% of paid apps using Pinch Analytics have been pirated.  We undercount – amount uncertain. If a paid application has been pirated: An average of 34% of all installs are cracked (In other words, about half of paid sales.) This varies widely.
Loose negative correlation between downloads and piracy
Jailbreaker≠Pirate Distinct devices we’ve counted that have been jailbroken: Distinct devices we’ve counted that have installed pirated apps: ~4.0M ~1.5M
Application piracy is global
Piracy correlates with GDP Piracy as % of installs Gross Domestic Product per capita
Pirates don’t stick around
Intensity of usage is lower
However, the apps crash more
Try before you buy? A common argument – pirated software is used prior to making a purchasing decision. Compare to average ‘lite’-to-paid conversion: 7.4% (1 in 14) Average cracked-to-legitimate conversion: 0.43% (1 in 233)

More Related Content

What's hot

What's hot (9)

VirusTotal Threat Intelligence and DNIF Use Cases
VirusTotal Threat Intelligence and DNIF Use CasesVirusTotal Threat Intelligence and DNIF Use Cases
VirusTotal Threat Intelligence and DNIF Use Cases
 
Symantec Threat Report 2017 - SSLRenewals
Symantec Threat Report 2017 - SSLRenewalsSymantec Threat Report 2017 - SSLRenewals
Symantec Threat Report 2017 - SSLRenewals
 
Top 10 Facts About Data Breaches
Top 10 Facts About Data BreachesTop 10 Facts About Data Breaches
Top 10 Facts About Data Breaches
 
The Next $50 Billion will Come From...Putting Users First
The Next $50 Billion will Come From...Putting Users FirstThe Next $50 Billion will Come From...Putting Users First
The Next $50 Billion will Come From...Putting Users First
 
Anteviral
AnteviralAnteviral
Anteviral
 
State of Application Security Vol. 4
State of Application Security Vol. 4State of Application Security Vol. 4
State of Application Security Vol. 4
 
Accumulo Summit 2015: Fraud Analytics using Accumulo, Julia and Fast SQL [Lev...
Accumulo Summit 2015: Fraud Analytics using Accumulo, Julia and Fast SQL [Lev...Accumulo Summit 2015: Fraud Analytics using Accumulo, Julia and Fast SQL [Lev...
Accumulo Summit 2015: Fraud Analytics using Accumulo, Julia and Fast SQL [Lev...
 
Canalys cybersecurity-benchmark-2019
Canalys cybersecurity-benchmark-2019 Canalys cybersecurity-benchmark-2019
Canalys cybersecurity-benchmark-2019
 
Your data is showing
Your data is showingYour data is showing
Your data is showing
 

Similar to Piracy in the Appstore

Bauer Heather Software Piracy
Bauer Heather Software PiracyBauer Heather Software Piracy
Bauer Heather Software Piracy
Heather Bauer
 
Hii assessing the_effectiveness_of_antivirus_solutions
Hii assessing the_effectiveness_of_antivirus_solutionsHii assessing the_effectiveness_of_antivirus_solutions
Hii assessing the_effectiveness_of_antivirus_solutions
Anatoliy Tkachev
 
10/20/2012 Meeting - Corporate Worldwide Anti-Piracy
10/20/2012 Meeting - Corporate Worldwide Anti-Piracy10/20/2012 Meeting - Corporate Worldwide Anti-Piracy
10/20/2012 Meeting - Corporate Worldwide Anti-Piracy
acfesj
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDC
Microsoft Asia
 
application-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracodeapplication-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracode
sciccone
 
Kaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
Kaseya Connect 2011 - Malwarebytes - Marcin KleczynskiKaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
Kaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
Kaseya
 

Similar to Piracy in the Appstore (20)

Bauer Heather Software Piracy
Bauer Heather Software PiracyBauer Heather Software Piracy
Bauer Heather Software Piracy
 
Assessing the Effectiveness of Antivirus Solutions
Assessing the Effectiveness of Antivirus SolutionsAssessing the Effectiveness of Antivirus Solutions
Assessing the Effectiveness of Antivirus Solutions
 
Hii assessing the_effectiveness_of_antivirus_solutions
Hii assessing the_effectiveness_of_antivirus_solutionsHii assessing the_effectiveness_of_antivirus_solutions
Hii assessing the_effectiveness_of_antivirus_solutions
 
CFOs in Jeopardy: What you don't know about software license compliance can b...
CFOs in Jeopardy: What you don't know about software license compliance can b...CFOs in Jeopardy: What you don't know about software license compliance can b...
CFOs in Jeopardy: What you don't know about software license compliance can b...
 
7 Bug Bounty Myths, BUSTED
7 Bug Bounty Myths, BUSTED7 Bug Bounty Myths, BUSTED
7 Bug Bounty Myths, BUSTED
 
Capgemini and HPE Team Up to Foster Behavioral Change That Brings Better Cybe...
Capgemini and HPE Team Up to Foster Behavioral Change That Brings Better Cybe...Capgemini and HPE Team Up to Foster Behavioral Change That Brings Better Cybe...
Capgemini and HPE Team Up to Foster Behavioral Change That Brings Better Cybe...
 
The Human Side of Security
The Human Side of SecurityThe Human Side of Security
The Human Side of Security
 
Apsalar Advertising Click Fraud and IAP Fraud Index for Apps
Apsalar Advertising Click Fraud and IAP Fraud Index for AppsApsalar Advertising Click Fraud and IAP Fraud Index for Apps
Apsalar Advertising Click Fraud and IAP Fraud Index for Apps
 
Apsalar App Fraud Index Report - July 2015
Apsalar App Fraud Index Report - July 2015Apsalar App Fraud Index Report - July 2015
Apsalar App Fraud Index Report - July 2015
 
Soft piracy
Soft piracySoft piracy
Soft piracy
 
The ABCs of Mobile App Fraud
The ABCs of Mobile App FraudThe ABCs of Mobile App Fraud
The ABCs of Mobile App Fraud
 
The ABCs of Mobile App Fraud
The ABCs of Mobile App FraudThe ABCs of Mobile App Fraud
The ABCs of Mobile App Fraud
 
How to Build Secure Mobile Apps.pdf
How to Build Secure Mobile Apps.pdfHow to Build Secure Mobile Apps.pdf
How to Build Secure Mobile Apps.pdf
 
10/20/2012 Meeting - Corporate Worldwide Anti-Piracy
10/20/2012 Meeting - Corporate Worldwide Anti-Piracy10/20/2012 Meeting - Corporate Worldwide Anti-Piracy
10/20/2012 Meeting - Corporate Worldwide Anti-Piracy
 
DrupalCon 2017: Security for Emerging Threats
DrupalCon 2017: Security for Emerging ThreatsDrupalCon 2017: Security for Emerging Threats
DrupalCon 2017: Security for Emerging Threats
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDC
 
application-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracodeapplication-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracode
 
Índice de software sin licencia en el mundo.
Índice de software sin licencia en el mundo. Índice de software sin licencia en el mundo.
Índice de software sin licencia en el mundo.
 
Kaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
Kaseya Connect 2011 - Malwarebytes - Marcin KleczynskiKaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
Kaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
 
La Seguridad en la Economía de las Aplicaciones
La Seguridad en la Economía de las AplicacionesLa Seguridad en la Economía de las Aplicaciones
La Seguridad en la Economía de las Aplicaciones
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Piracy in the Appstore