Dexdump (included in the SDK) can get you to the assembly code level, so you'd then have to hunt around for the checks, remove, and re-compile.
Unfortunately there is little that can be done to prevent reverse engineering and recompilation unless you totally lock down the app installation process (e.g. the iPhone way), and even then there are no guarantees... http://blog.wired.com/gadgets/2009/03/iphone-develope.html Al. --- * Written an Android App? - List it at http://andappstore.com/ * ====== Funky Android Limited is registered in England & Wales with the company number 6741909. The registered head office is Kemp House, 152-160 City Road, London, EC1V 2NX, UK. The views expressed in this email are those of the author and not necessarily those of Funky Android Limited, it's associates, or it's subsidiaries. -----Original Message----- From: [email protected] [mailto:[email protected]] On Behalf Of Stoyan Damov Sent: 31 March 2009 14:16 To: [email protected] Subject: [android-discuss] Re: Piracy and app "protection" On Tue, Mar 31, 2009 at 4:13 PM, Jean-Baptiste Queru <[email protected]> wrote: > > The dex format is actually well documented, there are official tools > to work with it (e.g. dexdump) as well as third-party tools. There's > nothing to reverse engineer, it's all out there. > So, one can reverse engineer a .dex into source code, remove any protection, recompile, re-sign with his key and thus remove the protection of any app for Android? Cheers --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "Android Discuss" group. To post to this group, send email to [email protected] To unsubscribe from this group, send email to [email protected] For more options, visit this group at http://groups.google.com/group/android-discuss?hl=en -~----------~----~----~----~------~----~------~--~---
