On 3 June 2012 18:01, Phil (list) <[email protected]> wrote: > On Jun 3, 2012, at 11:31 AM, Marcus Denker wrote: > >> >> How do people do it with Java? Java .jar files are as easy to decompile as >> Smalltalk bytecode... >> > > ProGuard (http://proguard.sourceforge.net/) is a popular method. In its > obfuscation phase it will rename most class and method names (i.e. anything > that doesn't need to be externally visible) to meaningless names so > MyClass.MyMethod becomes something like a.a. It can also generate a mapping > file so that when bug reports / crashes occur, the developer can map the > gibberish names back to the original names. Before the obfuscation phase, it > has optimization and shrinking phases to eliminate code that doesn't need to > be included for release (debugging code etc.) >
so, what prevents others from writing de-obfuscating tool and then read nice sources? no matter what you do, as long as you distribute executable code to masses, it can be reverse-engineered. You can only make it harder. But there is good way to prevent this from happening: stop selling binary files, start selling real support for your software, ship updates regularly, make customers happy. Then you will be immune from any piracy, because nobody will think pirating your software, because it is useless without your support. >> Marcus >> >> -- >> Marcus Denker -- http://marcusdenker.de >> >> > > Thanks, > Phil -- Best regards, Igor Stasenko.
