On Thu, Apr 12, 2012 at 5:55 PM, Justin Anderson <[email protected]> wrote: > One thing that I do that does help a little with the protection is check > that the paid app that runs my LVL check is signed with the same signature > as my free app... Still not foolproof, but it is a nice little measure that > helps prevent the more simple-minded hackers from cracking the app: > > PackageManager mgr = context.getPackageManager(); > int sigMatch = mgr.checkSignatures(context.getPackageName(), > AppConstants.APP_UNLOCK_PKG); > > //The unlock key MUST be installed or the license service will fail... > if (sigMatch != PackageManager.SIGNATURE_MATCH) > return false;
Nice idea. Actually, if the free app can get access to the paid app executable (which I hope it can) I might be possible to restore some of the protection by having the free app run anti-tampering checks on the paid one. That way, even if finding and disabling the LVL in the paid app is trivial, they will still have to find and disable all the (properly hidden and obfuscated) anti-tampering checks in the free app. -- You received this message because you are subscribed to the Google Groups "Android Developers" group. To post to this group, send email to [email protected] To unsubscribe from this group, send email to [email protected] For more options, visit this group at http://groups.google.com/group/android-developers?hl=en

