You should definitely be using reflection for any calls to platform APIs, since those of course can't be obfuscated by ProGuard.
On Fri, May 13, 2011 at 6:48 AM, Nikolay Elenkov <[email protected]>wrote: > On Fri, May 13, 2011 at 8:02 PM, Kostya Vasilyev <[email protected]> > wrote: > > This thread has a snippet of modified (hacked) code as well as a link to > the > > script's author: > > > > > http://groups.google.com/group/android-developers/browse_thread/thread/3d92715cd41208e/ > > > > Thanks, that blog has some interesting stuff. Reading the fingerprint > files of > the tool is also quite informative. Essentially every potentially useful > SDK > method gets replaced, so you'd better make sure you are not calling those > directly. The IO talk has some interesting ideas about this, but the more > advanced ones might be overkill for most people. > > -- > You received this message because you are subscribed to the Google > Groups "Android Developers" group. > To post to this group, send email to [email protected] > To unsubscribe from this group, send email to > [email protected] > For more options, visit this group at > http://groups.google.com/group/android-developers?hl=en > -- Dianne Hackborn Android framework engineer [email protected] Note: please don't send private questions to me, as I don't have time to provide private support, and so won't reply to such e-mails. All such questions should be posted on public forums, where I and others can see and answer them. -- You received this message because you are subscribed to the Google Groups "Android Developers" group. To post to this group, send email to [email protected] To unsubscribe from this group, send email to [email protected] For more options, visit this group at http://groups.google.com/group/android-developers?hl=en

