Chapter 3. Obfuscating Classes

 

“Any sufficiently advanced technology is indistinguishable from magic.”

 
 --Murphy's Technology Laws

Protecting the Ideas Behind Your Code

Reverse engineering and hacking have been around since the early days of software development. As a matter of fact, stealing or replicating someone else's ideas has always been the easiest way of creating competitive products. There is, of course, a ...

Get Covert Java™: Techniques for Decompiling, Patching, and Reverse Engineering now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.