MMM - did it seem to you the WTS had gone to extra lengths to prevent what you have done? Speculate why?
It is somewhat reasonable to think that they don't want to let other developers create programs against their data. So if they come out with an android app for the NWTx2, the WT wants people to download their app, not Mr. ex-JW that might link to other resources from jwfacts.com. :)
But then I catch myself... if that was their reason, they undermine the entire thing by posting the Bible online. In the end, even after getting past the DB encryption, I ended up just taking the text from the web version. Why? It was a lot easier - the text is right there for anyone to get. All I had to do was download it via HTTP and use standard objects to pull the text from the HTML. Why does this matter? Well, if I were making an android (or PC) app, I don't have to hack anything - I would simply link to the scripture and download it live from jw.org (and then insert commentary from jwfacts).
Ultimately, I don't know what it gains them to encrypt it.
As I mentioned before, even the WT library is vunerable. I don't need to know how the PUB files in the WB library are formatted to read the content there. Why? Because I know that the WT library program itself will decrypt it and display it in a window, and I know that you can copy the text to the clipboard. You think that can't be automted? PFFT! It surely can. I can create my own WT lib database if I wanted to without knowing any of the encryption.
So you might be asking why I spent time cracking the DB in the first place? Because the NWTx2 is new and they didn't have an easier way of getting it. The PDF was horrible to parse through, and it looked like my only choice until castthefirststone brought our attention to the android DB of it. If the DB was cracked then I could pull the text out of there without all of the PDF parsing issues that would most likely cause errors to appear in the text.
But, at the last moment, the WT put out an online version...
MMM