保护的Andr​​oid APK至prevent反编译,网络嗅探等反编译、网络、oid、Andr

2023-09-06 05:52:16 作者:薄荷糖、微凉

有没有办法来保护安卓apk文件,以便源$ C ​​$ C 不能再生?此外,还有一些的网络嗅探器 对于允许HTTP监控,是有办法绕过这些使得 输入/输出的网络流量无法监控?

我已阅读,code混淆,在一定程度上,可以使用 SourceForge上的Proguard的(参考)。

什么其他选择,我可以看看?

请指教。

感谢。

解决方案 您可以使用混淆混淆对象code,这使得它更难反编译(至少有自动反编译器)。混淆再多,都无法完全prevent手动编译。 使用HTTPS,以prevent嗅探。简单!

Is there a way to protect Android apk file so that the source code cannot be regenerated? Also, there are a number of network sniffers that allow HTTP monitoring, is there a way to bypass these such that the incoming/outgoing network traffic could not be monitored?

I have read that code obfuscation, to some extent, is possible using SourceForge's Proguard(Reference).

What are other alternatives that I can look into?

Please advise.

Thanks.

解决方案

You can use an obfuscator to obfuscate the object code, which makes it harder to decompile (at least with an automatic decompiler). No amount of obfuscation can totally prevent manual decompilation. Use HTTPS to prevent sniffing. Simple!