I don't know whether there are tools today that allow to go back all the way to compilable source code (especially since the compilation is a two-step process), but my understanding is that disassembled dalvik bytecode is quite readable on its own, so working directly there might not be that impractical.
JBQ On Tue, Mar 31, 2009 at 6:15 AM, Stoyan Damov <[email protected]> wrote: > > On Tue, Mar 31, 2009 at 4:13 PM, Jean-Baptiste Queru <[email protected]> wrote: >> >> The dex format is actually well documented, there are official tools >> to work with it (e.g. dexdump) as well as third-party tools. There's >> nothing to reverse engineer, it's all out there. >> > > So, one can reverse engineer a .dex into source code, remove any > protection, recompile, re-sign with his key and thus remove the > protection of any app for Android? > > Cheers > > > > -- Jean-Baptiste M. "JBQ" Queru Android Engineer, Google. Questions sent directly to me that have no reason for being private will likely get ignored or forwarded to a public forum with no further warning. --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "Android Discuss" group. To post to this group, send email to [email protected] To unsubscribe from this group, send email to [email protected] For more options, visit this group at http://groups.google.com/group/android-discuss?hl=en -~----------~----~----~----~------~----~------~--~---
