Chapter 3. Obfuscating Classes


“Any sufficiently advanced technology is indistinguishable from magic.”

 --Murphy's Technology Laws

Protecting the Ideas Behind Your Code

Reverse engineering and hacking have been around since the early days of software development. As a matter of fact, stealing or replicating someone else's ideas has always been the easiest way of creating competitive products. There is, of course, a ...

Get Covert Java™: Techniques for Decompiling, Patching, and Reverse Engineering now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.