本文介绍了保护的Android APK至prevent反编译,网络嗅探等的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!
问题描述
有没有办法来保护安卓apk文件,以便源$ C $ C不能再生?此外,还有一些的网络嗅探器对于允许HTTP监控,是有办法绕过这些使得输入/输出的网络流量无法监控?
我已阅读,code混淆,在一定程度上,可以使用SourceForge上的Proguard的(参考)。
什么其他选择,我可以看看?
请指教。
感谢。
解决方案
- 您可以使用混淆混淆对象code,这使得它更难反编译(至少有自动反编译器)。混淆再多,都无法完全prevent手动编译。
- 使用HTTPS,以prevent嗅探。简单!
Is there a way to protect Android apk file so that the source codecannot be regenerated? Also, there are a number of network sniffersthat allow HTTP monitoring, is there a way to bypass these such thatthe incoming/outgoing network traffic could not be monitored?
I have read that code obfuscation, to some extent, is possible usingSourceForge's Proguard(Reference).
What are other alternatives that I can look into?
Please advise.
Thanks.
解决方案
- You can use an obfuscator to obfuscate the object code, which makes it harder to decompile (at least with an automatic decompiler). No amount of obfuscation can totally prevent manual decompilation.
- Use HTTPS to prevent sniffing. Simple!
这篇关于保护的Android APK至prevent反编译,网络嗅探等的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持!