The relevant text from the page you're linked to is as follows:
Important: to protect your public key from malicious users and hackers, do not insert your public key in an entire literal string. Instead, build a string at runtime from fragments, or use a manipulation bit (such as XOR with some other string) to hide the actual key. The key itself is not secret information, but you do not want a hacker or an attacker to have a public key with a different key.
That is almost all you need to know. There is no harm to people knowing your public key, the potential harm here is that someone replaces the public key in your program on their own in order to reject purchases in the application to their account.
They assume that for this attacker it becomes more difficult for you to store the key in separate fragments or XORing with a key with a different line. Now, instead of just pasting your key over yours, they should figure out what kind of conversions you are doing with the string and make your own key suitable for this template. This works more and can deter occasional intruders, but will not prevent someone who is really determined.
Kevin source share