APK protection against Disassembly and others

Asked

Viewed 63 times

0

I would like to know how to protect the code of a APK Android, because if we extract, we have the templates, if we use certain programs, we have virtually all the classes.

What Ways Do You Know To Protect Against It ?

I would like a solid response with examples or useful links, because the concept itself, I found some, but I would like to know about the BR community.

  • https://stackoverflow.com/questions/13854425/how-to-avoid-reverse-engineering-of-an-apk-file

  • Rafael, I saw that you edited, wanted to know the best reason for me not to err in the next questions :) About the link, I saw exactly it, but are passing very superficially, both the most voted, and the second most voted. I wanted to know more specifically how it would be to obfuscate class codes, where I could take a look to get an initial notion understand ?

  • Try to highlight the important points of your question, to get better formatted.

  • In short, you can’t avoid it, it’s basically impossivel, What to do, is what was said, ofuscar, basically, make it difficult. Ex: minificar an archive JS is a means of making it difficult for them to read our JS (not that it is 100% effective, because there are sites that demystify). That’s basically it, there are thousands of ways to make it harder, but none that will truly solve the problem.

  • Our guy who Zica ! Basically all part "gross" that would make the "differential" of the app would be in webservice since there’s no way! Thanks Rafael !

1 answer

1


All the rough is on the back, the cool is to use Token to validate back-end sessions to protect yourself.

As I said, the important thing is to treat the back end well to avoid serious future problems, a read on that content.

Remember, the app itself is just Front, elementos, animações etc. Just like a page WEB.

Everyone goes through these problems, but if that’s the case minifique your files, and even ofusque a little, if it bothers you, there is no problem in hindering the work of malicious people.

Browser other questions tagged

You are not signed in. Login or sign up in order to post.