You should definitely be using reflection for any calls to platform APIs,
since those of course can't be obfuscated by ProGuard.

On Fri, May 13, 2011 at 6:48 AM, Nikolay Elenkov
<[email protected]>wrote:

> On Fri, May 13, 2011 at 8:02 PM, Kostya Vasilyev <[email protected]>
> wrote:
> > This thread has a snippet of modified (hacked) code as well as a link to
> the
> > script's author:
> >
> >
> http://groups.google.com/group/android-developers/browse_thread/thread/3d92715cd41208e/
> >
>
> Thanks, that blog has some interesting stuff.  Reading the fingerprint
> files of
> the tool is also quite informative. Essentially every potentially useful
> SDK
> method gets replaced, so you'd better make sure you are not calling those
> directly. The IO talk has some interesting ideas about this, but the more
> advanced ones might be overkill for most people.
>
> --
> You received this message because you are subscribed to the Google
> Groups "Android Developers" group.
> To post to this group, send email to [email protected]
> To unsubscribe from this group, send email to
> [email protected]
> For more options, visit this group at
> http://groups.google.com/group/android-developers?hl=en
>



-- 
Dianne Hackborn
Android framework engineer
[email protected]

Note: please don't send private questions to me, as I don't have time to
provide private support, and so won't reply to such e-mails.  All such
questions should be posted on public forums, where I and others can see and
answer them.

-- 
You received this message because you are subscribed to the Google
Groups "Android Developers" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to
[email protected]
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

Reply via email to