As far as I can tell, it's a ways of obfuscating/encrypting the shared prefs on your device, that store LVL info about last response, time to next retry etc.
As the salt and deviceId (however you make it, which is the topic of another question i want to ask...) are readily readable via dex2jar/decompiling, and anyone with a rooted device can grab your shared prefs file and then unencrypt/deobfuscate it at will, is the whole purpose just to make things that bit harder for the hacker, rather than actually making it hack proof?
Or am I missing a vital part of something?