Chapter 3. Obfuscating Classes
“Any sufficiently advanced technology is indistinguishable from magic.” | ||
--Murphy's Technology Laws |
IN THIS CHAPTER
Protecting the Ideas Behind Your Code
Reverse engineering and hacking have been around since the early days of software development. As a matter of fact, stealing or replicating someone else's ideas has always been the easiest way of creating competitive products. There is, of course, a ...
Get Covert Java™: Techniques for Decompiling, Patching, and Reverse Engineering now with the O’Reilly learning platform.
O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.