保护字符串常量对逆向工程 [英] Protect string constant against reverse-engineering
问题描述
我的Android应用程序,它具有硬codeD(静态字符串常量)凭据(用户/密码)通过SMTP发送电子邮件。
I have android application that has hard coded (static string constants) credentials (user/pass) for sending emails via SMTP.
现在的问题是,在apk文件.dex文件可以很容易地逆向工程,每个人都可以看到我的密码。
The problem is that .dex file in .apk can be easily reverse-engineered and everybody can see my password.
有没有办法如何保护这些凭据,而我仍然能够使用他们在我的课?
Is there a way how to secure these credentials, while i will still be able to use them in my classes?
推荐答案
我想你可以尝试code混淆器,但真的不会让你的密码100%安全的,我不知道它如何随着Android的编译器去。为什么不使用一个安全的Web认证,像谷歌的?
I guess you can try a code obfuscator, but really that won't make your password 100% secure and I don't know how well it goes along with the android compiler. Why not use a secured web authentication , like that of Google?
这篇关于保护字符串常量对逆向工程的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!