Chapter 3. Obfuscating Classes
“Any sufficiently advanced technology is indistinguishable from magic.”
|--Murphy's Technology Laws|
IN THIS CHAPTER
Protecting the Ideas Behind Your Code
Reverse engineering and hacking have been around since the early days of software development. As a matter of fact, stealing or replicating someone else's ideas has always been the easiest way of creating competitive products. There is, of course, a ...