> But I'm not sure that native code is any harder to patch, and there > are still identifiable syscalls or calls back up to java for i/o to > show where it tries to accomplish verification.
First of all it's much harder to bypass especially if you are dealing with optimized code and you will have to do it at least twice (for arm abi and armv7 abi). Event toolchain setup is more complicated. -- Bart Janusz (Beepstreet) -- You received this message because you are subscribed to the Google Groups "Android Developers" group. To post to this group, send email to [email protected] To unsubscribe from this group, send email to [email protected] For more options, visit this group at http://groups.google.com/group/android-developers?hl=en

