问题描述
我感兴趣的APK文件中的技术细节。我已经知道了APKTOOL能够提取等APK文件(包括smali来源)的所有布局文件,但我想khow的APKTOOL怎么做布局的提取,因为它们以某种方式加密的(如果您使用解压缩打开它)。
I'm interested in the technical details of APK files. I know already that the APKTOOL is able to extract all those layout files and so on of an APK file (including the smali sources), but I would like to khow, how the APKTOOL does the extraction of layouts, since they are crypted somehow (in case that you open it with unzip).
是否有人知道一些有关如何Android的COM presses /加密(?)这些布局中的APK文件吗?是否有任何的描述了吗?
Does anybody know something about how Android compresses/encrypts(?) those layout files in the APK files? Is there any description out there?
有谁知道一种方法来防止再造的布局? (类似的ProGuard用于源$ C $ C)?
Does anybody know a way to protect layouts against reengineering? (similar to ProGuard used for the source code)?
感谢。
推荐答案
据我所知,在所有的APK XML文件都存储在二进制XML格式。因此,他们不加密,这不是一个大问题去阅读。
As far as I know, all xml files in APKs are stored in Binary XML format. So they aren't encrypted and that's not a big deal to read them.
什么保护,我不认为有办法以某种方式混淆他们。使布局难以阅读的唯一方法是直接从code创建视图,但我不认为你应该这样做。
What about protection, I don't think there's a way to obfuscate them somehow. The only way to make layouts difficult for reading is to create view directly from code, but I don't think you should do it.
这篇关于Android的再造:提取和保护APK资源(技术问题)的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持!