保护字符串常量对逆向工程 [英] Protect string constant against reverse-engineering

查看:220
本文介绍了保护字符串常量对逆向工程的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

我的Andr​​oid应用程序,它具有硬codeD(静态字符串常量)凭据(用户/密码)通过SMTP发送电子邮件。

I have android application that has hard coded (static string constants) credentials (user/pass) for sending emails via SMTP.

现在的问题是,在apk文件.dex文件可以很容易地逆向工程,每个人都可以看到我的密码。

The problem is that .dex file in .apk can be easily reverse-engineered and everybody can see my password.

有没有办法如何保护这些凭据,而我仍然能够使用他们在我的课?

Is there a way how to secure these credentials, while i will still be able to use them in my classes?

推荐答案

我想你可以尝试code混淆器,但真的不会让你的密码100%安全的,我不知道它如何随着Android的编译器去。为什么不使用一个安全的Web认证,像谷歌的?

I guess you can try a code obfuscator, but really that won't make your password 100% secure and I don't know how well it goes along with the android compiler. Why not use a secured web authentication , like that of Google?

这篇关于保护字符串常量对逆向工程的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆