Living Dangerously without Obfuscation
<p>First and foremost, this is not a “How To” or even a step by step tutorial to hack an Android Application.</p>
<p>This is my journey when I started learning how important it is to implement secure coding to the project—and some takeaways that I would like to share when taking this journey.</p>
<p>For the context, I’m an Android application developer and I love learning all about Android development. I’ve taken some projects related to smart house and VOD platform at my previous workplace. During my time there, I caught an interest in securing Android application using obfuscation.</p>
<p>Because no application is safe from <a href="https://www.computerworld.com/article/2585652/reverse-engineering.html" rel="noopener ugc nofollow" target="_blank">Reverse Engineering</a>—where you can decompile an APK to its original form (decompiled .java classes), and see how it was built. There’s a saying:</p>
<p><a href="https://proandroiddev.com/living-dangerously-without-proguard-affda698a46b"><strong>Learn More</strong></a></p>