reverse engineering protection

I read in a sample of the book Decompiling Android by Nolan Godfrey that the usage of goto method can make the source code produce non readable code when decompiling the apk.

The goto method is unused in Java though..So how can someone make use of this?

Are there any other methods someone can use to make the decompiled code non readable?

(Please do not comment or answer that no matter what I do the CIA will always be able to fully reverse my app. And obviously I'm past the point of using Proguard, etc).


You can try ProGuard for basic protection, or DexGuard for full protection and encryption: https://www.guardsquare.com/en/dexguard

Comparision: https://www.guardsquare.com/en/blog/dexguard-vs-proguard

However, on larger project using many external libs, configuration may be not straighforward

链接地址: http://www.djcxy.com/p/90714.html

上一篇: 在Android模拟器中切换到横向模式

下一篇: 逆向工程保护