I check the signature in my app. But I use reflection to do all calls to get 
the answer and I dynamically generate up the strings to pass into the 
reflection in various places throughout the app and in different orders. And 
even then I use reflection to further convert the signature to a hash and 
then throughout the app I check the odd character in the hash to make sure 
it matches the same character in the correct hash. This means that you can't 
find a mention of "PackageManager", "PackageInfo", "Signature" or 0x40 in 
any text or imported class and you also won't find the signature or the hash 
clearly visible anywhere. At the very least this isn't something that 
anti-lvl can currently spot.

Plus, after I similarly decompiled a hacked version of my app, I added a 
mild tweak to the lvl code and I can see that newly hacked versions of my 
app haven't spotted that change so are failing constantly. :-)

HTH.

-- 
You received this message because you are subscribed to the Google
Groups "Android Developers" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to
[email protected]
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

Reply via email to