Know Who has Tampered and Where
Leveraging geolocation technology, see the domain and geographical location of where tampered applications are running. Sort your tampers by domain to see if any high profile customer domains show up.
Defend Against Tampering
Obfuscation is not foolproof. Force your application to shut down or act erratically when it has been tampered with.