This vetting process deters hackers from writing
malicious apps to be sold in the App Store or even try to
attack a published app. They first need to give their
identities in order to register with Apple and acquire a
signing certificate, which adds another defensive measure against any malicious activity.