COMMERCIAL IN CONFIDENCE – PRIVATE AND CONFIDENTIAL – WITHOUT PREJUDICE Hello You have made the following errors. 1. To hack a program’s in built add JavaScript WebView is not a vulnerability. It is a hack. It can be done with any WebView. 2. To ASP email sender you claim of regardless of the parameters, sends to me and me only. The |To=| is ignored. 3. The URL that gets the IP address if the hacker changed, would merely go to a different URL and send me a different value, but any person who could hack could go to any HTTP address anyway, and if you were a programmer, you would know that you don’t even need addJavaScript to do so, in fact you don’t need my apk! 4. The transmission of personal details is secure. 5. It is a violation of the Terms and Conditions of the Apple Play Store to decompile any App. Any App can be redirected by a string editor from a hacker, this is not considered an exploit. APKEditor or any java unpacker can change a string. An exploit is something that is able to self run and automatically accomplish this. You are claiming that you need to have a hacker on stand-by for every single user of this application. This is not plausible, and unlawful. 6. You didn’t get results that’s why you got |0|. Had you had followed the instructions which are now much more clear, which it was very clear on the Android pages – IT IS NOT FOR INTERNAL LAN USE. It is for external IP ADDRESSES! Had you have done so, the report would have emailed me a string like |80|443| etc. 7. Then writing to a file by hacking Javascript is actually considered hacking. A vulnerability is an exploitation. If it needs a hacker to exploit, then the hacker could write the code that could do far worse than ‘’visiting a website” or writing a binary file, they don’t need a host APK as they need a host to run the code in the first place. 8. You have engaged in a crime and I will proceed to prosecute you under Australian law which has worldwide jurisdiction unless you send an email to both EDB and myself in 48 hours withdrawing this ridiculous attempt to defame me. I could pick 10,000 Apps and claim the same thing. Please supply me with a list of your Apps. CRIMES ACT 1958 - SECT 247G Unauthorised access to or modification of restricted data (1) A person who— (a) causes any unauthorised access to or modification of restricted data held in a computer; and (b) knows that the access or modification is unauthorised; and (c) intends to cause the access or modification— is guilty of an offence and liable to level 7 imprisonment (2 years maximum). (2) An offence against this section is a summary offence. (3) In this section "restricted data" means data held in a computer to which access is restricted by an access control system associated with a function of the computer. S. 247H inserted by No. 10/2003 s. 5. I will also be suing for extortion and defamation. Simon Smith L https://www.linkedin.com/in/simonsmithinvestigator P +61 410 643 121