Living Dangerously without Obfuscation

<p>First and foremost, this is not a &ldquo;How To&rdquo; or even a step by step tutorial to hack an Android Application.</p> <p>This is my journey when I started learning how important it is to implement secure coding to the project&mdash;and some takeaways that I would like to share when taking this journey.</p> <p>For the context, I&rsquo;m an Android application developer and I love learning all about Android development. I&rsquo;ve taken some projects related to smart house and VOD platform at my previous workplace. During my time there, I caught an interest in securing Android application using obfuscation.</p> <p>Because no application is safe from&nbsp;<a href="https://www.computerworld.com/article/2585652/reverse-engineering.html" rel="noopener ugc nofollow" target="_blank">Reverse Engineering</a>&mdash;where you can decompile an APK to its original form (decompiled .java classes), and see how it was built. There&rsquo;s a saying:</p> <p><a href="https://proandroiddev.com/living-dangerously-without-proguard-affda698a46b"><strong>Learn More</strong></a></p>