OK, I see your point, that could slow them down, but it would slow me
down for sure, maintaining a native and a Java project. Not the
mention the bugs you can get from native code...
But agreed, it's an option.

Hugo

On Aug 24, 5:23 pm, a1 <[email protected]> wrote:
> On 24 Sie, 16:15, Hugo Visser <[email protected]> wrote:
>
> > No, that won't do it, since the entry point is always Java / Dalvik
> > byte code. Since you can decompile and patch that with relative ease,
> > you can just make the native calls to the crc check library no-ops or
> > whatever and you're done without patching any native lib.
>
> No, if the native call do something else((and viable) you'll have to
> patch native.
> Consider following scenario:
>
> JAVA:
> void onCreate() {
>  ...
>  boolean isValid = nativeInit();
>
> }
>
> NATIVE:
> jboolean nativeInit() {
>   // initialize internal structures here, eg. alloc some object etc
>
>   return performValidityCheck()
>
> }
>
> sure entry point is in bytecode but removing entire call will cause
> crash.
>
> --
> Bart Janusz (Beepstreet)
>
>
>
>
>
> > Only obfuscation will help to some extend, making it harder to find
> > what to patch, IMHO of course :)
>
> > Hugo
>
> > On Aug 24, 10:39 am, a1 <[email protected]> wrote:
>
> > > If you put antipiracy check (eg. CRC checking to detect package
> > > modification) in native code along with some other vital routines, one
> > > will have to patch native implementation, it's of course doable, but
> > > will take more time.
>
> > > --
> > > Bart Janusz (Beepstreet)
>
> > > On 24 Sie, 08:34, Hugo Visser <[email protected]> wrote:> Even native 
> > > code doesn't help you, the call to the native method can
> > > > also be decompiled and patched, without bothering with the native code
> > > > at all. Like John says, it's an inherit problem of a language that
> > > > runs on the vm: you can decompile the byte code. You can just make it
> > > > harder to find the point to patch in the decompiled code.
> > > > They will always be able to pirate your app, but it's not as easy as
> > > > copying the apk and putting it up on a website anymore. So in that
> > > > sense it helps.
>
> > > > Hugo
>
> > > > On Aug 24, 6:48 am, a1 <[email protected]> wrote:
>
> > > > > It's really simple, if you use stock implementation of LVL your app
> > > > > will be cracked in no time, otherwise (if you make the code
> > > > > complicated enough and then obfuscate) it will take at least week or
> > > > > two to crack it. If you use native code and put most of the antypiracy
> > > > > code there you will be good for long time.
>
> > > > > --
> > > > > Regards,
> > > > > Bart Janusz (Beepstreet)
>
> > > > > On 23 Sie, 23:50, Brad <[email protected]> wrote:
>
> > > > > > Well, just as I was finishing adding LVL support to my apps, I come
> > > > > > across this article:
>
> > > > > >http://www.androidpolice.com/2010/08/23/exclusive-report-googles-andr...
>
> > > > > > Of course we all knew that this new copy protection could be broken
> > > > > > (as is the case for all DRM), but I guess I had hoped that it would
> > > > > > take a little more effort.   Looks like this will turn out to be a
> > > > > > "one-click" crack.
>
> > > > > > Will Google up the ante?  Is it a lost cause on such an open 
> > > > > > platform?

-- 
You received this message because you are subscribed to the Google
Groups "Android Developers" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to
[email protected]
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

Reply via email to