07-03-2010 04:37 AM
hmmm...interesting. I always though this wasnt possible. I believe you could open the cod files and find strings in a Hex editor but not decompile.
07-03-2010 04:39 AM - edited 07-03-2010 04:51 AM
But I found on video, he has all the modules and class of the CODs. And JAVA BYTECODES?????
I afraid one day, all of our applications will be decompiled by this guy!!!
07-03-2010 11:48 AM - edited 07-03-2010 11:57 AM
Not the best place to be talking about this, I tried typing in a response and the actual name of the original app (his is just a GUI overlay and maybe language change) is blocked on these forums.
Besides RIM's EULA for devs states they cannot decompile COD files.
EDIT: Ok I couldn't find RIM's EULA for devs but nearly every company that doesn't make open source APIs basically say "you cannot decompile our files or those that use our files"
07-03-2010 09:07 PM - edited 07-03-2010 09:08 PM
Because I afraid he can decompile our apps, and if this occurs, the target of this Topic is to find a way to re-encapsulate our software to avoid decompiled........
07-03-2010 09:32 PM
Just do some searches on the internet (or use his software which isn't the original code, he just added a GUI) and download the program. Then try to decompile your own COD.
If it works then you have to find a new way to prevent decompilation, otherwise the decompiler that pretty much everyone who wants to decompile COD files uses can't decompile your COD file.
07-05-2010 12:52 AM
The lesson is: relying on secret code to implement security or to safeguard intellectual property is a weak form of protection. Assume that all your code is executing in a highly instrumented emulation of the target execution environment and design your security protocols as if an attacker has full access to the internals of the software you deliver. Put critical data and essential elements of the protocol on a well-run server, where it is reasonably out of reach of attackers.