. "Regardless of platform, jail-broken mobile devices can result in hackers gaining root access to mobile applications in order to analyze security logic, insert malware, trojanize apps, subvert authentication or access controls or steal intellectual property, such as algorithms or keys." . . .