Not all third party sites maintain as secure an approach to the market as does Amazon. Some have
little or no vetting. Some alternative markets exist solely to distribute malware. Figure 4 is the result of research conducted by Timothy Vidas and Nicolas Christin, analyzing the malware content of application stores. When a point is graphed on the dotted line, the store is entirely comprised of malware.