Chapter 3. Obfuscating Classes
“Any sufficiently advanced technology is indistinguishable from magic.” | ||
--Murphy's Technology Laws |
IN THIS CHAPTER
Protecting the Ideas Behind Your Code
Reverse engineering and hacking have been around since the early days of software development. As a matter of fact, stealing or replicating someone else's ideas has always been the easiest way of creating competitive products. There is, of course, a ...
Get Covert Java™: Techniques for Decompiling, Patching, and Reverse Engineering now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.